INFO: task kworker/1:0:23 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df879d84 r8:00000002 r7:60000113 r6:df879d8c r5:83242400 r4:83242400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83242400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb0b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a63b8c r4:85a63800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a63b8c r4:830cd080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83242400 r8:830cd0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cd080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd080 r8:8027f5e8 r7:df819d50 r6:830cd100 r5:83242400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:830cb100 INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: bd9c8000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/1:2:44 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:44 tgid:44 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df915d84 r8:00000002 r7:60000113 r6:df915d8c r5:83813000 r4:83813000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83813000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df915e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9fc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83813000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9db000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a62b8c r4:85a62800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a62b8c r4:832d8d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83813000 r8:832d8dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832d8d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832d8d80 r8:8027f5e8 r7:df911e60 r6:83328c00 r5:83813000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf915fb0 to 0xdf915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:832d7b00 INFO: task kworker/1:2:44 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: be86d000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/0:2:725 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:725 tgid:725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e052dd84 r8:00000002 r7:60000113 r6:e052dd8c r5:83ada400 r4:83ada400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ada400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e052de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b24440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ada400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac3d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85127b8c r4:85127800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85127b8c r4:83362e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ada400 r8:83362eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83362e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83362e80 r8:8027f5e8 r7:df83de60 r6:83362f00 r5:83ada400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe052dfb0 to 0xe052dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83363c80 INFO: task kworker/0:2:725 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: be86d000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/1:1:3090 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:3090 tgid:3090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df971d84 r8:00000002 r7:60000113 r6:df971d8c r5:842e2400 r4:842e2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842e2400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df971e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9bc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:842e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a61b8c r4:85a61800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a61b8c r4:848d2180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842e2400 r8:848d21ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d2180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d2180 r8:8027f5e8 r7:df915e60 r6:848d2500 r5:842e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf971fb0 to 0xdf971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84930680 INFO: task kworker/1:1:3090 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: bef43000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/1:3:3109 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3109 tgid:3109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df969d84 r8:00000002 r7:60000113 r6:df969d8c r5:838e5400 r4:838e5400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838e5400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df969e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:838e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba99000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6338c r4:85a63000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6338c r4:848d2a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838e5400 r8:848d2aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d2a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d2a80 r8:8027f5e8 r7:df915e60 r6:848d2480 r5:838e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf969fb0 to 0xdf969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8469ff80 INFO: task kworker/1:3:3109 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: bf5f7000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/0:4:3118 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df9ddd84 r8:00000002 r7:60000113 r6:df9ddd8c r5:83243c00 r4:83243c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83243c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9dde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564fbc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83243c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebabf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497cf8c r4:8497cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497cf8c r4:84942500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83243c00 r8:8494252c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84942500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942500 r8:8027f5e8 r7:eb039e60 r6:84942280 r5:83243c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849d7440 INFO: task kworker/0:4:3118 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c0659000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/0:6:3124 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df9f9d84 r8:00000002 r7:60000113 r6:df9f9d8c r5:83238c00 r4:83238c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83238c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490c340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83238c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0504000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500838c r4:85008000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8500838c r4:84942680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83238c00 r8:849426ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84942680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942680 r8:8027f5e8 r7:df9dde60 r6:84942780 r5:83238c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849d7840 INFO: task kworker/0:6:3124 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c0659000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/1:9:3132 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3132 tgid:3132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:8444b000 r4:8444b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8444b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846eb900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8444b000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa61000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a4f8c r4:852a4c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a4f8c r4:83328680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444b000 r8:833286ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83328680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83328680 r8:8027f5e8 r7:df941e60 r6:84942900 r5:8444b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8443a640 INFO: task kworker/1:9:3132 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c0659000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/0:7:3137 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df9e9d84 r8:00000002 r7:60000113 r6:df9e9d8c r5:8444e000 r4:8444e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8444e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490c0c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8444e000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01d9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85008b8c r4:85008800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85008b8c r4:84942a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444e000 r8:84942a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84942a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942a00 r8:8027f5e8 r7:df9dde60 r6:84942b00 r5:8444e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e9fb0 to 0xdf9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849d7f80 INFO: task kworker/0:7:3137 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c13ea000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/0:8:3139 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df995d84 r8:00000002 r7:60000113 r6:df995d8c r5:8444d400 r4:8444d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8444d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df995e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84929ec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8444d400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b89b8c r4:84b89800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b89b8c r4:84942a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444d400 r8:84942aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84942a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942a80 r8:8027f5e8 r7:df9dde60 r6:84942c00 r5:8444d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf995fb0 to 0xdf995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849d75c0 INFO: task kworker/0:8:3139 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c13ea000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3141 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:8444c800 r4:8444c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8444c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847fbb00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8444c800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb03000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b8a78c r4:84b8a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b8a78c r4:84942b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444c800 r8:84942bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84942b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942b80 r8:8027f5e8 r7:df9dde60 r6:84942c80 r5:8444c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849b6e00 INFO: task kworker/0:9:3141 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c196d000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3143 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:8444bc00 r4:8444bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8444bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85258a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8444bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa8f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512778c r4:85127400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8512778c r4:84942d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8444bc00 r8:84942d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84942d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942d00 r8:8027f5e8 r7:df9dde60 r6:84942d80 r5:8444bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499f040 INFO: task kworker/0:10:3143 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c196d000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3144 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa31d84 r8:00000002 r7:60000013 r6:dfa31d8c r5:84448c00 r4:84448c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84448c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c2f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84448c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfed1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501e38c r4:8501e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501e38c r4:83328a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84448c00 r8:83328a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83328a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83328a00 r8:8027f5e8 r7:dfa3de60 r6:84942e00 r5:84448c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8443ac40 INFO: task kworker/1:11:3144 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c1e61000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3147 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:84359800 r4:84359800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84359800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a72680 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84359800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabdf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a7b8c r4:852a7800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852a7b8c r4:83328b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84359800 r8:83328bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83328b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83328b80 r8:8027f5e8 r7:dfa3de60 r6:84942e80 r5:84359800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8443ae00 INFO: task kworker/1:12:3147 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c1e61000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3158 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:8435a400 r4:8435a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8435a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84826740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8435a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4949000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497c78c r4:8497c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497c78c r4:84942f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8435a400 r8:84942f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84942f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942f00 r8:8027f5e8 r7:df9dde60 r6:84942f80 r5:8435a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa71fb0 to 0xdfa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499f3c0 INFO: task kworker/0:11:3158 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c2207000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3159 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:83ac2400 r4:83ac2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac2400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84811240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac2400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05cb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509a38c r4:8509a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509a38c r4:83328e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac2400 r8:83328eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83328e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83328e80 r8:8027f5e8 r7:dfa3de60 r6:838a2a80 r5:83ac2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499a740 INFO: task kworker/1:13:3159 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c2207000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3160 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:83ac1800 r4:83ac1800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac1800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7b200 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac1800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacbf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509b38c r4:8509b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509b38c r4:830cd280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac1800 r8:830cd2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cd280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd280 r8:8027f5e8 r7:dfa3de60 r6:8426ed00 r5:83ac1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaddfb0 to 0xdfaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499a740 INFO: task kworker/1:14:3160 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c2207000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3161 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfae1d84 r8:00000002 r7:60000013 r6:dfae1d8c r5:83ac0c00 r4:83ac0c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac0c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509bf8c r4:8509bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509bf8c r4:8426ec80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac0c00 r8:8426ecac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8426ec80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8426ec80 r8:8027f5e8 r7:dfadde60 r6:8426e900 r5:83ac0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499a740 INFO: task kworker/1:15:3161 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c2509000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3162 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:83ae6000 r4:83ae6000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ae6000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533ab80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ae6000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89d3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fdb8c r4:851fd800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fdb8c r4:8426e880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ae6000 r8:8426e8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8426e880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8426e880 r8:8027f5e8 r7:dfae1e60 r6:84280f80 r5:83ae6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499a200 INFO: task kworker/1:16:3162 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c2774000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3163 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfae9d84 r8:00000002 r7:60000113 r6:dfae9d8c r5:8382d400 r4:8382d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8382d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ced40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8382d400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a69f8c r4:85a69c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a69f8c r4:84941000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8382d400 r8:8494102c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84941000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84941000 r8:8027f5e8 r7:dfae5e60 r6:84941080 r5:8382d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae9fb0 to 0xdfae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499a300 INFO: task kworker/1:17:3163 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c2774000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3164 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfaf1d84 r8:00000002 r7:60000113 r6:dfaf1d8c r5:83908c00 r4:83908c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83908c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c1c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83908c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa89000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fff8c r4:851ffc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fff8c r4:84941100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83908c00 r8:8494112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84941100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84941100 r8:8027f5e8 r7:dfae9e60 r6:84941180 r5:83908c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499a6c0 INFO: task kworker/1:18:3164 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c2e00000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3165 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfaf5d84 r8:00000002 r7:60000113 r6:dfaf5d8c r5:83ad4800 r4:83ad4800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad4800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cd800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ad4800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfabd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547eb8c r4:8547e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547eb8c r4:84941200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad4800 r8:8494122c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84941200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84941200 r8:8027f5e8 r7:dfae9e60 r6:84941280 r5:83ad4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499a780 INFO: task kworker/1:19:3165 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c3505000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3166 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:83ad3000 r4:83ad3000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad3000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ad3000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb6b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5ff8c r4:85a5fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5ff8c r4:84941300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad3000 r8:8494132c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84941300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84941300 r8:8027f5e8 r7:dfae9e60 r6:84941380 r5:83ad3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499aa00 INFO: task kworker/1:20:3166 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c3505000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3168 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df979d84 r8:00000002 r7:60000113 r6:df979d8c r5:8435ec00 r4:8435ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8435ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df979e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848268c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8435ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0683000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85363b8c r4:85363800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85363b8c r4:84942200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8435ec00 r8:8494222c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84942200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84942200 r8:8027f5e8 r7:df9dde60 r6:8387c600 r5:8435ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf979fb0 to 0xdf979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499f300 INFO: task kworker/0:12:3168 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c3505000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3170 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:8435b000 r4:8435b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8435b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855340c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8435b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb755000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855eb38c r4:855eb000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855eb38c r4:830b8480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8435b000 r8:830b84ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:8027f5e8 r7:df9dde60 r6:830b8700 r5:8435b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499f8c0 INFO: task kworker/0:13:3170 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c3b91000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3172 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3172 tgid:3172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:84358c00 r4:84358c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84358c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577dac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84358c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb157000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572038c r4:85720000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8572038c r4:830b8780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84358c00 r8:830b87ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8780 r8:8027f5e8 r7:dfafde60 r6:830b8600 r5:84358c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499f940 INFO: task kworker/0:14:3172 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c3b91000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:8435bc00 r4:8435bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8435bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564fc80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8435bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba2f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497d38c r4:8497d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497d38c r4:830b8400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8435bc00 r8:830b842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027f5e8 r7:dfb09e60 r6:830b8500 r5:8435bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499fac0 INFO: task kworker/0:15:3174 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c3b91000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3177 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:8435e000 r4:8435e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8435e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566de00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8435e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb43f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497d78c r4:8497d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497d78c r4:8387c680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8435e000 r8:8387c6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8387c680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8387c680 r8:8027f5e8 r7:dfb09e60 r6:832c5180 r5:8435e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499fc40 INFO: task kworker/0:16:3177 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c44ea000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3179 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb2dd84 r8:00000002 r7:60000113 r6:dfb2dd8c r5:84358000 r4:84358000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84358000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85731ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84358000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb5f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85348b8c r4:85348800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85348b8c r4:832c5600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84358000 r8:832c562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:832c5600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832c5600 r8:8027f5e8 r7:dfb09e60 r6:84551b80 r5:84358000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499fe00 INFO: task kworker/0:17:3179 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c44ea000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3181 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:8435c800 r4:8435c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8435c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589e040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8435c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab17000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534938c r4:85349000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534938c r4:84921e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8435c800 r8:84921eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84921e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84921e80 r8:8027f5e8 r7:dfb09e60 r6:84921f80 r5:8435c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499ff00 INFO: task kworker/0:18:3181 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c4826000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3182 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:84196000 r4:84196000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84196000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8f100 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84196000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec609000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534a38c r4:8534a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534a38c r4:84921780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84196000 r8:849217ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84921780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84921780 r8:8027f5e8 r7:dfb39e60 r6:84921e00 r5:84196000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499ff00 INFO: task kworker/0:19:3182 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c4d00000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3185 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:83a18000 r4:83a18000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a18000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bdbc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a18000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e080b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534878c r4:85348400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534878c r4:84921d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a18000 r8:84921dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84921d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84921d80 r8:8027f5e8 r7:dfa7de60 r6:84921f00 r5:83a18000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916240 INFO: task kworker/0:20:3185 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c4fc2000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3187 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb69d84 r8:00000002 r7:60000113 r6:dfb69d8c r5:83a1e000 r4:83a1e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a1e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d1080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a1e000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85349b8c r4:85349800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85349b8c r4:84913100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a1e000 r8:8491312c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913100 r8:8027f5e8 r7:dfa7de60 r6:84913080 r5:83a1e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916100 INFO: task kworker/0:21:3187 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c4fc2000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3189 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:83a1a400 r4:83a1a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a1a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580cf00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a1a400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c838c r4:858c8000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c838c r4:84913000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a1a400 r8:8491302c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913000 r8:8027f5e8 r7:dfa7de60 r6:84913200 r5:83a1a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb75fb0 to 0xdfb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916440 INFO: task kworker/0:22:3189 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c5a8a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3191 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:83a18c00 r4:83a18c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a18c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad08c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534bf8c r4:8534bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534bf8c r4:84913180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a18c00 r8:849131ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913180 r8:8027f5e8 r7:dfa7de60 r6:84913300 r5:83a18c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849165c0 INFO: task kworker/0:23:3191 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c5a8a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3192 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb5dd84 r8:00000002 r7:60000113 r6:dfb5dd8c r5:83adb000 r4:83adb000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83adb000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac5140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83adb000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba31000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534ab8c r4:8534a800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534ab8c r4:84913280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83adb000 r8:849132ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913280 r8:8027f5e8 r7:dfb81e60 r6:84913380 r5:83adb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb5dfb0 to 0xdfb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849165c0 INFO: task kworker/0:24:3192 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c5a8a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:83add400 r4:83add400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83add400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524e9c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83add400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb993000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497ff8c r4:8497fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497ff8c r4:84913400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83add400 r8:8491342c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913400 r8:8027f5e8 r7:dfb81e60 r6:84913500 r5:83add400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916800 INFO: task kworker/0:25:3194 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c5a8a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3196 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb99d84 r8:00000002 r7:60000113 r6:dfb99d8c r5:83adec00 r4:83adec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83adec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525d900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83adec00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497eb8c r4:8497e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497eb8c r4:84913480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83adec00 r8:849134ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913480 r8:8027f5e8 r7:dfb8de60 r6:84913600 r5:83adec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916980 INFO: task kworker/0:26:3196 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c5a8a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3198 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:83ade000 r4:83ade000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ade000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553fcc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ade000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb96f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497e78c r4:8497e400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497e78c r4:84913580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ade000 r8:849135ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913580 r8:8027f5e8 r7:dfb8de60 r6:84913700 r5:83ade000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916b00 INFO: task kworker/0:27:3198 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c657a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3200 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:83ad8000 r4:83ad8000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad8000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846a7100 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ad8000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec55f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473d38c r4:8473d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473d38c r4:84913680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad8000 r8:849136ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913680 r8:8027f5e8 r7:dfba5e60 r6:84913800 r5:83ad8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916e00 INFO: task kworker/0:28:3200 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c657a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3202 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbbdd84 r8:00000002 r7:60000113 r6:dfbbdd8c r5:83ad8c00 r4:83ad8c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad8c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbbde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85240e80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ad8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497df8c r4:8497dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497df8c r4:84913780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad8c00 r8:849137ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913780 r8:8027f5e8 r7:dfbb1e60 r6:84913900 r5:83ad8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbbdfb0 to 0xdfbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916ec0 INFO: task kworker/0:29:3202 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c657a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3204 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3204 tgid:3204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbc9d84 r8:00000002 r7:60000113 r6:dfbc9d8c r5:83236000 r4:83236000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83236000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85637fc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83236000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec527000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473c78c r4:8473c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473c78c r4:84913880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83236000 r8:849138ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913880 r8:8027f5e8 r7:dfbb1e60 r6:84913a00 r5:83236000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8443a7c0 INFO: task kworker/0:30:3204 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c657a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3206 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df985d84 r8:00000002 r7:60000113 r6:df985d8c r5:83236c00 r4:83236c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83236c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df985e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857719c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83236c00 r7:00000000 r6:83018000 r5:00001000 r4:7f147000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca55000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473e38c r4:8473e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473e38c r4:84913b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83236c00 r8:84913b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913b00 r8:8027f5e8 r7:dfbc9e60 r6:84913a80 r5:83236c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf985fb0 to 0xdf985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7080 INFO: task kworker/0:31:3206 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c6be0000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3208 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df9f5d84 r8:00000002 r7:60000113 r6:df9f5d8c r5:83252400 r4:83252400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83252400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566e000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83252400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec517000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473db8c r4:8473d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473db8c r4:84913b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83252400 r8:84913bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913b80 r8:8027f5e8 r7:df985e60 r6:84913c80 r5:83252400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7440 INFO: task kworker/0:32:3208 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c700f000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3210 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa1dd84 r8:00000002 r7:60000113 r6:dfa1dd8c r5:842c6000 r4:842c6000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842c6000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566eb00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb79b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473c38c r4:8473c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473c38c r4:84913c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842c6000 r8:84913c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913c00 r8:8027f5e8 r7:df985e60 r6:84913d80 r5:842c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7080 INFO: task kworker/0:33:3210 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c72ce000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3212 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa21d84 r8:00000002 r7:60000113 r6:dfa21d8c r5:842c0000 r4:842c0000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842c0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa21e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:875305c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f149000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebab1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3db8c r4:85c3d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3db8c r4:84913d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842c0000 r8:84913d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913d00 r8:8027f5e8 r7:df985e60 r6:84913e80 r5:842c0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa21fb0 to 0xdfa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7440 INFO: task kworker/0:34:3212 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c72ce000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3214 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:842c3c00 r4:842c3c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842c3c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:87530c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f18b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3d78c r4:85c3d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3d78c r4:84913e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842c3c00 r8:84913e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84913e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84913e00 r8:8027f5e8 r7:dfa21e60 r6:84913f80 r5:842c3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7380 INFO: task kworker/0:35:3214 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c777b000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3216 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa39d84 r8:00000002 r7:60000113 r6:dfa39d8c r5:842c1800 r4:842c1800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842c1800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa39e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:87af1940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f20f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece7d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473f38c r4:8473f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473f38c r4:846b1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842c1800 r8:846b102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1000 r8:8027f5e8 r7:dfa21e60 r6:846b1100 r5:842c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa39fb0 to 0xdfa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7a80 INFO: task kworker/0:36:3216 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c7c05000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:842c0c00 r4:842c0c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842c0c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564a040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8a5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3e78c r4:85c3e400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3e78c r4:846b1200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842c0c00 r8:846b122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1200 r8:8027f5e8 r7:dfa39e60 r6:846b1080 r5:842c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a79c0 INFO: task kworker/0:37:3218 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c80df000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3220 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3220 tgid:3220 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa61d84 r8:00000002 r7:60000113 r6:dfa61d8c r5:842c4800 r4:842c4800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842c4800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564afc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f211000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0f3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3f78c r4:85c3f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3f78c r4:846b1180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842c4800 r8:846b11ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1180 r8:8027f5e8 r7:dfa39e60 r6:846b1300 r5:842c4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7a80 INFO: task kworker/0:38:3220 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c80df000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3222 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa6dd84 r8:00000002 r7:60000113 r6:dfa6dd8c r5:83812400 r4:83812400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83812400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa6de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f2280 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83812400 r7:00000000 r6:83018000 r5:00001000 r4:7f20f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5fb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473eb8c r4:8473e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473eb8c r4:846b1280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83812400 r8:846b12ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1280 r8:8027f5e8 r7:dfa39e60 r6:846b1400 r5:83812400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa6dfb0 to 0xdfa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7dc0 INFO: task kworker/0:39:3222 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c865c000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3224 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:83810000 r4:83810000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83810000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8579b840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83810000 r7:00000000 r6:83018000 r5:00001000 r4:7f281000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8588278c r4:85882400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8588278c r4:846b1380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83810000 r8:846b13ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1380 r8:8027f5e8 r7:dfa6de60 r6:846b1500 r5:83810000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7e80 INFO: task kworker/0:40:3224 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c8cf9000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3226 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:83a13c00 r4:83a13c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a13c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1c23c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f373000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed573000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee038c r4:87ee0000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee038c r4:846b1480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a13c00 r8:846b14ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1480 r8:8027f5e8 r7:dfa6de60 r6:846b1600 r5:83a13c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7c40 INFO: task kworker/0:41:3226 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c8cf9000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3229 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:83a12400 r4:83a12400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a12400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d0040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a12400 r7:00000000 r6:83018000 r5:00001000 r4:7f323000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5a1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473fb8c r4:8473f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473fb8c r4:846b1580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a12400 r8:846b15ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1580 r8:8027f5e8 r7:dfbcde60 r6:846b1680 r5:83a12400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846be080 INFO: task kworker/0:42:3229 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c91a5000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3231 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbf1d84 r8:00000002 r7:60000113 r6:dfbf1d8c r5:83a16000 r4:83a16000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a16000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b19c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a16000 r7:00000000 r6:83018000 r5:00001000 r4:7f20f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5a9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8874ef8c r4:8874ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8874ef8c r4:846b1700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a16000 r8:846b172c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1700 r8:8027f5e8 r7:dfbcde60 r6:846b1800 r5:83a16000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846be1c0 INFO: task kworker/0:43:3231 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c93eb000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3233 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbfdd84 r8:00000002 r7:60000113 r6:dfbfdd8c r5:83a16c00 r4:83a16c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a16c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbfde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c0fd840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a16c00 r7:00000000 r6:83018000 r5:00001000 r4:7f395000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8ace278c r4:8ace2400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8ace278c r4:846b1780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a16c00 r8:846b17ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1780 r8:8027f5e8 r7:dfbcde60 r6:846b1900 r5:83a16c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbfdfb0 to 0xdfbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846be440 INFO: task kworker/0:44:3233 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c9a35000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3234 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3234 tgid:3234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbe5d84 r8:00000002 r7:60000113 r6:dfbe5d8c r5:83a13000 r4:83a13000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a13000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1c2c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a13000 r7:00000000 r6:83018000 r5:00001000 r4:7f381000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed395000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee178c r4:87ee1400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee178c r4:846b1880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a13000 r8:846b18ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1880 r8:8027f5e8 r7:dfbfde60 r6:846b1980 r5:83a13000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe5fb0 to 0xdfbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846be440 INFO: task kworker/0:45:3234 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c9a35000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3237 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc09d84 r8:00000002 r7:60000113 r6:dfc09d8c r5:838f2400 r4:838f2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838f2400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1cfec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f3d3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5eb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee3b8c r4:87ee3800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee3b8c r4:846b1a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838f2400 r8:846b1a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1a00 r8:8027f5e8 r7:dfbfde60 r6:846b1a80 r5:838f2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc09fb0 to 0xdfc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846be940 INFO: task kworker/0:46:3237 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c9c83000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3238 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3238 tgid:3238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc21d84 r8:00000002 r7:60000113 r6:dfc21d8c r5:838f0000 r4:838f0000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838f0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846cbfc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f435000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed46d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87eec38c r4:87eec000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87eec38c r4:846b1b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838f0000 r8:846b1b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1b00 r8:8027f5e8 r7:dfc09e60 r6:846b1c00 r5:838f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc21fb0 to 0xdfc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846be440 INFO: task kworker/0:47:3238 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ca3c0000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3240 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:838f0c00 r4:838f0c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838f0c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552ad80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f431000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8dd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8581b78c r4:8581b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8581b78c r4:846b1b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838f0c00 r8:846b1bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1b80 r8:8027f5e8 r7:dfc21e60 r6:846b1c80 r5:838f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846be940 INFO: task kworker/0:48:3240 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ca3c0000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:49:3243 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:49 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc2dd84 r8:00000002 r7:60000113 r6:dfc2dd8c r5:838f3c00 r4:838f3c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838f3c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846cb700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f44b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed683000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bdb8c r4:849bd800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849bdb8c r4:846b1d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838f3c00 r8:846b1d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1d00 r8:8027f5e8 r7:dfc21e60 r6:846b1d80 r5:838f3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846bedc0 INFO: task kworker/0:49:3243 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cac46000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:3245 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3245 tgid:3245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc45d84 r8:00000002 r7:60000113 r6:dfc45d8c r5:838f6000 r4:838f6000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838f6000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc45e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f51f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc51000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8d55bb8c r4:8d55b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8d55bb8c r4:846b1e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838f6000 r8:846b1e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1e00 r8:8027f5e8 r7:dfc21e60 r6:846b1f00 r5:838f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc45fb0 to 0xdfc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846bef80 INFO: task kworker/0:50:3245 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cac46000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:3247 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:51 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc51d84 r8:00000002 r7:60000113 r6:dfc51d8c r5:838f5400 r4:838f5400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838f5400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e3b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:838f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f477000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed60f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87eecb8c r4:87eec800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87eecb8c r4:846b1e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838f5400 r8:846b1eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846b1e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846b1e80 r8:8027f5e8 r7:dfc45e60 r6:846b1f80 r5:838f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846a7f80 INFO: task kworker/0:51:3247 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cb1f9000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:3249 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc5dd84 r8:00000002 r7:60000113 r6:dfc5dd8c r5:84a88000 r4:84a88000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a88000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc5de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f8bc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a88000 r7:00000000 r6:83018000 r5:00001000 r4:7f547000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87eecf8c r4:87eecc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87eecf8c r4:846d3100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a88000 r8:846d312c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3100 r8:8027f5e8 r7:dfc45e60 r6:846d3000 r5:84a88000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc5dfb0 to 0xdfc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5280 INFO: task kworker/0:52:3249 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cb52c000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:53:3251 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:53 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc69d84 r8:00000002 r7:60000013 r6:dfc69d8c r5:84a88c00 r4:84a88c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a88c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc69e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d57c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a88c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5ad000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed56b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bf38c r4:849bf000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849bf38c r4:846d3080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a88c00 r8:846d30ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3080 r8:8027f5e8 r7:dfc5de60 r6:846d3200 r5:84a88c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc69fb0 to 0xdfc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5380 INFO: task kworker/0:53:3251 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cb52c000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:54:3252 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:54 state:D stack:0 pid:3252 tgid:3252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc81d84 r8:00000002 r7:60000013 r6:dfc81d8c r5:83826000 r4:83826000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83826000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:90024740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83826000 r7:00000000 r6:83018000 r5:00001000 r4:7f5b9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc23000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ef438c r4:87ef4000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ef438c r4:846d3180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83826000 r8:846d31ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3180 r8:8027f5e8 r7:dfc69e60 r6:84941400 r5:83826000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc81fb0 to 0xdfc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5380 INFO: task kworker/0:54:3252 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cb52c000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:55:3254 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:55 state:D stack:0 pid:3254 tgid:3254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc89d84 r8:00000002 r7:60000013 r6:dfc89d8c r5:83820000 r4:83820000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83820000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:90024380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83820000 r7:00000000 r6:83018000 r5:00001000 r4:7f5b3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edbf5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849be38c r4:849be000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849be38c r4:846d3280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83820000 r8:846d32ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3280 r8:8027f5e8 r7:dfc69e60 r6:84941480 r5:83820000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc89fb0 to 0xdfc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5540 INFO: task kworker/0:55:3254 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cbf1c000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:56:3256 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:56 state:D stack:0 pid:3256 tgid:3256 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc95d84 r8:00000002 r7:60000013 r6:dfc95d8c r5:83823000 r4:83823000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83823000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc95e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:900240c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83823000 r7:00000000 r6:83018000 r5:00001000 r4:7f5b1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb7f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849be78c r4:849be400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849be78c r4:846d3380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83823000 r8:846d33ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3380 r8:8027f5e8 r7:dfc69e60 r6:84941500 r5:83823000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc95fb0 to 0xdfc95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5800 INFO: task kworker/0:56:3256 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cc27a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:57:3258 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:57 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfca1d84 r8:00000002 r7:60000013 r6:dfca1d8c r5:83ad0000 r4:83ad0000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663b00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ad0000 r7:00000000 r6:83018000 r5:00001000 r4:7f5a5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3c7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87eef38c r4:87eef000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87eef38c r4:846d3400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad0000 r8:846d342c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3400 r8:8027f5e8 r7:dfc69e60 r6:84941580 r5:83ad0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca1fb0 to 0xdfca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5640 INFO: task kworker/0:57:3258 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cc27a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:58:3260 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:58 state:D stack:0 pid:3260 tgid:3260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb11d84 r8:00000002 r7:60000013 r6:dfb11d8c r5:83ac6c00 r4:83ac6c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac6c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d5900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ac6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5ab000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb35000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bf78c r4:849bf400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849bf78c r4:846d3480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac6c00 r8:846d34ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3480 r8:8027f5e8 r7:dfca1e60 r6:84941600 r5:83ac6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d58c0 INFO: task kworker/0:58:3260 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cc27a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:59:3262 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:59 state:D stack:0 pid:3262 tgid:3262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb41d84 r8:00000002 r7:60000013 r6:dfb41d8c r5:84a00000 r4:84a00000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a00000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb41e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a00000 r7:00000000 r6:83018000 r5:00001000 r4:7f5a9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edab3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bff8c r4:849bfc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849bff8c r4:846d3300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a00000 r8:846d332c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3300 r8:8027f5e8 r7:dfca1e60 r6:84941680 r5:84a00000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb41fb0 to 0xdfb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5880 INFO: task kworker/0:59:3262 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cc6e9000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:60:3264 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:60 state:D stack:0 pid:3264 tgid:3264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb71d84 r8:00000002 r7:60000013 r6:dfb71d8c r5:84a00c00 r4:84a00c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a00c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663d00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a00c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5a7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed98b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87eefb8c r4:87eef800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87eefb8c r4:846d3500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a00c00 r8:846d352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3500 r8:8027f5e8 r7:dfca1e60 r6:84941700 r5:84a00c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d58c0 INFO: task kworker/0:60:3264 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ccb68000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:61:3266 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:3266 tgid:3266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfca9d84 r8:00000002 r7:60000013 r6:dfca9d8c r5:84a01800 r4:84a01800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a01800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a01800 r7:00000000 r6:83018000 r5:00001000 r4:7f5a3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda61000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87eeeb8c r4:87eee800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87eeeb8c r4:846d3600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a01800 r8:846d362c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3600 r8:8027f5e8 r7:dfca1e60 r6:84941780 r5:84a01800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca9fb0 to 0xdfca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5c80 INFO: task kworker/0:61:3266 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ccb68000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:62:3268 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:62 state:D stack:0 pid:3268 tgid:3268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcadd84 r8:00000002 r7:60000013 r6:dfcadd8c r5:84a02400 r4:84a02400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a02400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcade08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a02400 r7:00000000 r6:83018000 r5:00001000 r4:7f5a1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8eb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87eee38c r4:87eee000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87eee38c r4:846d3680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a02400 r8:846d36ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3680 r8:8027f5e8 r7:dfca9e60 r6:84941800 r5:84a02400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcadfb0 to 0xdfcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5c40 INFO: task kworker/0:62:3268 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cd0d2000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:63:3270 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:63 state:D stack:0 pid:3270 tgid:3270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcb1d84 r8:00000002 r7:60000113 r6:dfcb1d8c r5:84a03000 r4:84a03000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a03000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85663500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a03000 r7:00000000 r6:83018000 r5:00001000 r4:7f59f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed843000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87eedb8c r4:87eed800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87eedb8c r4:846d3700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a03000 r8:846d372c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3700 r8:8027f5e8 r7:dfcade60 r6:84941880 r5:84a03000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb1fb0 to 0xdfcb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d7080 INFO: task kworker/0:63:3270 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cd791000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:64:3273 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:64 state:D stack:0 pid:3273 tgid:3273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcbdd84 r8:00000002 r7:60000113 r6:dfcbdd8c r5:84a05400 r4:84a05400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a05400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcbde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:89b69600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a05400 r7:00000000 r6:83018000 r5:00001000 r4:7f7a5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceeb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847cc78c r4:847cc400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847cc78c r4:846d3580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a05400 r8:846d35ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3580 r8:8027f5e8 r7:dfcade60 r6:84941900 r5:84a05400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcbdfb0 to 0xdfcbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d7080 INFO: task kworker/0:64:3273 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cdb05000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:65:3275 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:65 state:D stack:0 pid:3275 tgid:3275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcc5d84 r8:00000002 r7:60000113 r6:dfcc5d8c r5:84a03c00 r4:84a03c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a03c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85694a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f5a1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ef578c r4:87ef5400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ef578c r4:846d3800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a03c00 r8:846d382c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3800 r8:8027f5e8 r7:dfcbde60 r6:84941980 r5:84a03c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc5fb0 to 0xdfcc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d71c0 INFO: task kworker/0:65:3275 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cdb05000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ee163000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:91a0c38c r4:91a0c000 r4:846d3880 Exception stack(0xdfccdfb0 to 0xdfccdff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:846ded00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:67 state:D stack:0 pid:3278 tgid:3278 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecde3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:68:3280 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:68 state:D stack:0 pid:3280 tgid:3280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcd9d84 r8:00000002 r7:60000013 r6:dfcd9d8c r5:84a09800 r4:84a09800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a09800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:89b693c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a09800 r7:00000000 r6:83018000 r5:00001000 r4:7f7a3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceb3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847ccb8c r4:847cc800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847ccb8c r4:846d3980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a09800 r8:846d39ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3980 r8:8027f5e8 r7:dfcd5e60 r6:84941b00 r5:84a09800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd9fb0 to 0xdfcd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a08000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:89b69080 r5:00001000 r4:ece5b000 r7:dddced80 r6:83018000 r5:847ccf8c r4:846d3a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a08000 r8:846d3a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3a00 r8:8027f5e8 r7:dfcd5e60 r6:84941b80 r5:84a08000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce1fb0 to 0xdfce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d7200 INFO: task kworker/0:69:3282 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cecb2000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:70:3284 blocked for more than 452 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ece4b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a0bc00 r8:846d3aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d7940 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r5:80000013 r4:80239bb0 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:71:3286 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:71 state:D stack:0 pid:3286 tgid:3286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcf1d84 r8:00000002 r7:60000113 r6:dfcf1d8c r5:84a0c800 r4:84a0c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a0c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d0480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a0c800 r7:00000000 r6:83018000 r5:00001000 r4:7f79d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece3b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847cd78c r4:847cd400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847cd78c r4:846d3b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0c800 r8:846d3b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3b00 r8:8027f5e8 r7:dfcd5e60 r6:84941c80 r5:84a0c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf1fb0 to 0xdfcf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d7c40 INFO: task kworker/0:71:3286 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cf127000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:84b52f8c r4:84b52c00 r4:846ded00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf5e08 r5:00001000 r4:dfa51000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a0b000 r8:846d37ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:84b52f8c r4:84b52c00 r4:846ded00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd01e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:91a39940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a0ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f72f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed65f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ef5f8c r4:87ef5c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ef5f8c r4:846d3c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0ec00 r8:846d3c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3c00 r8:8027f5e8 r7:dfcf5e60 r6:84941d80 r5:84a0ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd01fb0 to 0xdfd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d5480 INFO: task kworker/0:73:3291 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cfb5b000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:74:3292 blocked for more than 452 seconds. task:kworker/0:74 state:D stack:0 pid:3292 tgid:3292 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:dfb7d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05e1dc0 r5:00001000 r4:e01f9000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed633000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:87ef638c r4:846d3c80 Exception stack(0xdfcedfb0 to 0xdfcedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d7c40 INFO: task kworker/0:75:3294 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d04b5000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:76:3297 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:76 state:D stack:0 pid:3297 tgid:3297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd0dd84 r8:00000002 r7:60000113 r6:dfd0dd8c r5:84a06c00 r4:84a06c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a06c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd0de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d0f40 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdd3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 r5:84b52f8c r4:84b52c00 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd15e08 r5:00001000 r4:ecdbf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:847cef8c r4:846d3e00 5fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:84b52f8c r4:84b52c00 r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:78:3301 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:78 state:D stack:0 pid:3301 tgid:3301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd25d84 r8:00000002 r7:60000113 r6:dfd25d8c r5:84a11800 r4:84a11800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a11800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd25e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d0b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a11800 r7:00000000 r6:83018000 r5:00001000 r4:7f795000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecda7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847ceb8c r4:847ce800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847ceb8c r4:846d3e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a11800 r8:846d3eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3e80 r8:8027f5e8 r7:dfcf5e60 r6:846f6000 r5:84a11800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd25fb0 to 0xdfd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e1d28 to 0xe05e1d70) r4:e05e1dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:846ded00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd31e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd2f000 r7:dddced80 r6:83018000 r5:847cff8c r4:846d3f00 Exception stack(0xdfd31fb0 to 0xdfd31ff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecd47000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847cf78c r4:847cf400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847cf78c r4:846d3f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a12400 r8:846d3fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d3f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846d3f80 r8:8027f5e8 r7:dfd31e60 r6:846f6100 r5:84a12400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd39fb0 to 0xdfd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846e7540 INFO: task kworker/0:80:3305 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d0a8d000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecd67000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:847cf38c r4:846d3d00 1fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:84b52f8c r4:84b52c00 r4:846ded00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd49e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:87af1400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f783000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd29000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ef738c r4:87ef7000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ef738c r4:846f8100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a13c00 r8:846f812c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846f8100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846f8100 r8:8027f5e8 r7:dfd31e60 r6:846f6200 r5:84a13c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd49fb0 to 0xdfd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846e7800 INFO: task kworker/0:82:3309 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d10f4000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd51e08 r9:83018005 r8:84a16000 r7:00000000 r6:83018000 r5:00001000 r4:7f787000 r5:00001000 r4:ecc97000 r7:dddced80 r6:83018000 r5:87ef7b8c r4:846f8000 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e1d28 to 0xe05e1d70) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:84:3313 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:84 state:D stack:0 pid:3313 tgid:3313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd59d84 r8:00000002 r7:60000113 r6:dfd59d8c r5:84a15400 r4:84a15400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a15400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd59e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:87af1040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a15400 r7:00000000 r6:83018000 r5:00001000 r4:7f78d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd17000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847cdf8c r4:847cdc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a15400 r8:846f81ac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e05e1dc0 r5:00001000 r4:e01f9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eccef000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:847cd38c r4:846f8200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a14800 r8:846f822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846f8200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846f8200 r8:8027f5e8 r7:dfd51e60 r6:846f6380 r5:84a14800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd61fb0 to 0xdfd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846e7d80 INFO: task kworker/0:85:3315 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d1b50000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eccaf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:846f8280 9fa0: 00000000 00000000 00000000 00000000 Call trace: 1d20: d1f24000 e01b7000 00000001 80239b98 7f157000 00000001 r4:e05e1dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:846ded00 1fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:84a18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f785000 r5:00001000 r4:ecc6f000 r7:dddced80 r6:83018000 r5:87ef778c r4:846f8380 9fa0: 00000000 00000000 00000000 00000000 Call trace: 1d20: d1f24000 e01b7000 00000001 80239b98 7f157000 00000001 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3328 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3328 tgid:3328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd7dd84 r8:00000002 r7:60000013 r6:dfd7dd8c r5:84a1b000 r4:84a1b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a1b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd7de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a1b000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6878c r4:85a68400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6878c r4:846f6600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a1b000 r8:846f662c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846f6600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846f6600 r8:8027f5e8 r7:dfae9e60 r6:846f6680 r5:84a1b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd7dfb0 to 0xdfd7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846efc80 INFO: task kworker/1:21:3328 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d232f000 e01b7000 00000001 80239b98 7f157000 00000001 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84a7ddc0 task:kworker/1:22 state:D stack:0 pid:3330 tgid:3330 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ebc57000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 Exception stack(0xdfc39fb0 to 0xdfc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846eff00 INFO: task kworker/1:22:3330 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d27f9000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec493000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a7c440 Call trace: Exception stack(0xe05e1d28 to 0xe05e1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:84b52f8c r4:84b52c00 r4:846ded00 1fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdfc71fb0 to 0xdfc71ff8) Workqueue: events bpf_prog_free_deferred [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d2d21000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:187:3763 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:187 state:D stack:0 pid:3763 tgid:3763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0569d84 r8:00000002 r7:60000013 r6:e0569d8c r5:850c0000 r4:850c0000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0569e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847fbf40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 r5:00001000 r4:e00a3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b8b38c r4:84a70a00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e069f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84b5638c r4:846de500 Exception stack(0xe0571fb0 to 0xe0571ff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:84b52f8c r4:84b52c00 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:189:3785 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:189 state:D stack:0 pid:3785 tgid:3785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e05a5d84 r8:00000002 r7:60000113 r6:e05a5d8c r5:84a39800 r4:84a39800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a39800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84929840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a39800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b8938c r4:84b89000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b8938c r4:84a6ef80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a39800 r8:84a6efac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a6ef80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a6ef80 r8:8027f5e8 r7:e0569e60 r6:84ab3000 r5:84a39800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05a5fb0 to 0xe05a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab5700 INFO: task kworker/0:189:3785 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d3325000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r5:84b52f8c r4:84b52c00 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7ddc0 task:kworker/1:153 state:D stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e05e5d84 r8:00000002 r7:60000113 r6:e05e5d8c r5:84a3e000 r4:84a3e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a3e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e050d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7de40 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r4:00000000 r5:84b52f8c r4:84b52c00 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7ddc0 task:kworker/1:154 state:D stack:0 pid:3804 tgid:3804 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:e05e9000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:155:3806 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:155 state:D stack:0 pid:3806 tgid:3806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e05f5d84 r8:00000002 r7:60000113 r6:e05f5d8c r5:850c8c00 r4:850c8c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c8c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a75440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b5378c r4:84b53400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b5378c r4:846dee80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c8c00 r8:846deeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846dee80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846dee80 r8:8027f5e8 r7:e0571e60 r6:84ab3580 r5:850c8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05f5fb0 to 0xe05f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a75240 INFO: task kworker/1:155:3806 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d3746000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b52f8c r4:84b52c00 r4:846ded00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0601000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:157:3810 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:157 state:D stack:0 pid:3810 tgid:3810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e01edd84 r8:00000002 r7:60000013 r6:e01edd8c r5:84b6d400 r4:84b6d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b6d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01ede08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a75700 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0611000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84b6d400 r8:84a4c12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05e1dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:158:3812 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:158 state:D stack:0 pid:3812 tgid:3812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e060dd84 r8:00000002 r7:60000013 r6:e060dd8c r5:84b6c800 r4:84b6c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b6c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e060de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e061d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a75480 INFO: task kworker/1:158:3812 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d3df6000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84a7ddc0 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e063d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b54b8c r4:84b54800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b54b8c r4:84a4c180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b6ec00 r8:84a4c1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4c180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4c180 r8:8027f5e8 r7:e0571e60 r6:84a4c300 r5:84b6ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0619fb0 to 0xe0619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a756c0 INFO: task kworker/1:159:3814 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 1d60: 80230ad4 80239bb0 80000013 ffffffff r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064b000 r5:84b5538c r4:84b55000 r10:61c88647 r9:84bc5400 r8:84a4c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a756c0 Call trace: 1d20: d448f000 e01b7000 00000001 80239b98 7f157000 00000001 r4:00000000 r5:84b52f8c r4:84b52c00 r4:846ded00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0649e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a75bc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b70000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0657000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b5578c r4:84b55400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b5578c r4:84a4c380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b70000 r8:84a4c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4c380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4c380 r8:8027f5e8 r7:e0571e60 r6:84a4c500 r5:84b70000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0649fb0 to 0xe0649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a75c80 INFO: task kworker/1:161:3818 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d448f000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 r5:00001000 r4:e01f9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0663000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84b55f8c r4:84a4c480 Exception stack(0xe0655fb0 to 0xe0655ff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:84b52f8c r4:84b52c00 r4:846ded00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab5e00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b71800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e067f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b55b8c r4:84b55800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b55b8c r4:84a4c580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b71800 r8:84a4c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4c580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4c580 r8:8027f5e8 r7:e0571e60 r6:84a4c700 r5:84b71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0661fb0 to 0xe0661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a75c80 INFO: task kworker/1:163:3823 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d50e8000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a9e08 r9:83018205 r8:84b72400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e06d7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84b5678c r4:84a4c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73000 r8:84a4c7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4c780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4c780 r8:8027f5e8 r7:e06a9e60 r6:84a4c900 r5:84b73000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b1fb0 to 0xe06b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846dd100 INFO: task kworker/1:165:3827 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d5550000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:166:3828 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:166 state:D stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e06cb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84b73c00 r8:84a4c8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05e1dc0 r5:00001000 r4:e01f9000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:167:3831 blocked for more than 453 seconds. [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:e06e3000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06d5fb0 to 0xe06d5ff8) Workqueue: events bpf_prog_free_deferred 1d20: d5550000 e01b7000 00000001 80239b98 7f157000 00000001 r4:00000000 r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:168:3832 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:168 state:D stack:0 pid:3832 tgid:3832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e06e1d84 r8:00000002 r7:60000013 r6:e06e1d8c r5:84b75400 r4:84b75400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b75400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846dd7c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b75400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ef000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b57b8c r4:84b57800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b57b8c r4:84a4cb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b75400 r8:84a4cb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4cb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4cb00 r8:8027f5e8 r7:e06d5e60 r6:84a4cb80 r5:84b75400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e1fb0 to 0xe06e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846dd1c0 INFO: task kworker/1:168:3832 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d58e8000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 r5:84b52f8c r4:84b52c00 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846dd980 r5:00001000 r4:e06fb000 r7:ddde2d80 r6:83018200 r5:84b5738c r4:84a4cc00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:170:3837 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:170 state:D stack:0 pid:3837 tgid:3837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e06edd84 r8:00000002 r7:60000113 r6:e06edd8c r5:84b76c00 r4:84b76c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b76c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ede08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ddbc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b76c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0717000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500038c r4:85000000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500038c r4:84a4cc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b76c00 r8:84a4ccac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4cc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4cc80 r8:8027f5e8 r7:e056de60 r6:84a4ce00 r5:84b76c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06edfb0 to 0xe06edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846dd780 INFO: task kworker/1:170:3837 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d5f12000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:846ded00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0711e08 r9:83018205 r8:850cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 r5:00001000 r4:e0707000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80000013 r4:80239bb0 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:172:3841 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:172 state:D stack:0 pid:3841 tgid:3841 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0725d84 r8:00000002 r7:60000113 r6:e0725d8c r5:850cc800 r4:850cc800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850cc800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0725e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846f59c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa17000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b8978c r4:84b89400 r7:ddde2d80 r6:83018200 r5:84b8978c r4:84a4cf00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a7ddc0 task:kworker/1:173 state:D stack:0 pid:3842 tgid:3842 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:e072b000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:846ddc00 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:174:3844 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:174 state:D stack:0 pid:3844 tgid:3844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0741d84 r8:00000002 r7:60000013 r6:e0741d8c r5:850ce000 r4:850ce000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ce000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0741e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ddf80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df97f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85000f8c r4:85000c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85000f8c r4:84a4ce80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ce000 r8:84a4ceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a4ce80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a4ce80 r8:8027f5e8 r7:e0725e60 r6:84ab3800 r5:850ce000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0741fb0 to 0xe0741ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:175:3846 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:175 state:D stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0745d84 r8:00000002 r7:60000113 r6:e0745d8c r5:850ca400 r4:850ca400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ca400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0745e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846bb200 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd33000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500178c r4:85001400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500178c r4:846def80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ca400 r8:846defac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846def80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846def80 r8:8027f5e8 r7:e0725e60 r6:84ab3880 r5:850ca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0745fb0 to 0xe0745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:846ded00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfbd3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:850cec00 r8:846deb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e074de08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcdb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500138c r4:85001000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500138c r4:846ba000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850cd400 r8:846ba02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ba000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ba000 r8:8027f5e8 r7:e0745e60 r6:84ab3900 r5:850cd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe074dfb0 to 0xe074dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846dd580 INFO: task kworker/1:177:3850 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d70e8000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:178 state:D stack:0 pid:3852 tgid:3852 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0755e08 r5:00001000 r4:dfda7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85001b8c r4:85001800 r10:61c88647 r9:850d8c00 r8:846ba12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r4:84a7ddc0 task:kworker/1:179 state:D stack:0 pid:3854 tgid:3854 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfdd9000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0761fb0 to 0xe0761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846bb040 INFO: task kworker/1:179:3854 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d7918000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:180:3856 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:180 state:D stack:0 pid:3856 tgid:3856 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0769d84 r8:00000002 r7:60000113 r6:e0769d8c r5:850d9800 r4:850d9800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d9800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r4:00000000 r5:00001000 r4:dfe61000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:850d9800 r8:846ba22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:e0771d84 r8:00000002 r7:60000013 r6:e0771d8c r5:850da400 r4:00000000 r4:00000000 r5:00001000 r4:dfe1f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846bb280 INFO: task kworker/1:181:3858 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d7dcd000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:182:3860 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:182 state:D stack:0 pid:3860 tgid:3860 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0779d84 r8:00000002 r7:60000113 r6:e0779d8c r5:850db000 r4:850db000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850db000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0779e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018205 r8:850db000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 r5:00001000 r4:dfedd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:850db000 r8:846ba32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:e0781d84 r8:00000002 r7:60000013 r6:e0781d8c r5:850dbc00 r4:850dbc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850dbc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0781e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846bb880 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe99000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85002b8c r4:85002800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85002b8c r4:846ba380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850dbc00 r8:846ba3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ba380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ba380 r8:8027f5e8 r7:e0779e60 r6:84ab3c80 r5:850dbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0781fb0 to 0xe0781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846bb540 INFO: task kworker/1:183:3862 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d82c7000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 r4:850de000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0789e08 r5:00001000 r4:dffab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:850de000 r8:846ba42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:185:3866 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:185 state:D stack:0 pid:3866 tgid:3866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0791d84 r8:00000002 r7:60000013 r6:e0791d8c r5:850dec00 r4:850dec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850dec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0791e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846bbc40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff5d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500378c r4:85003400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500378c r4:846ba480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850dec00 r8:846ba4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ba480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ba480 r8:8027f5e8 r7:e0789e60 r6:84ab3d80 r5:850dec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0791fb0 to 0xe0791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846bb940 INFO: task kworker/1:185:3866 is blocked on a mutex likely owned by task kworker/1:152:3800. r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dff73000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:e0799d84 r8:00000002 r7:60000013 r6:e0799d8c r5:850dc800 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846bbe80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff8d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85003f8c r4:85003c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85003f8c r4:846ba500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850dc800 r8:846ba52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ba500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ba500 r8:8027f5e8 r7:e0789e60 r6:84ab3e80 r5:850dc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0799fb0 to 0xe0799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846bbe40 INFO: task kworker/1:187:3870 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d8d3a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e078de08 r5:00001000 r4:dffe9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8500438c r4:846ba580 Exception stack(0xe078dfb0 to 0xe078dff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0031000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500478c r4:85004400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500478c r4:846ba600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c0c00 r8:846ba62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ba600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ba600 r8:8027f5e8 r7:e078de60 r6:84ab3f80 r5:847c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe079dfb0 to 0xe079dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846bbd40 INFO: task kworker/1:189:3874 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d8d3a000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:190:3876 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:190 state:D stack:0 pid:3876 tgid:3876 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07a1d84 r8:00000002 r7:60000013 r6:e07a1d8c r5:847c1800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a1e08 r5:00001000 r4:dfb4d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85004f8c r4:85004c00 r10:61c88647 r9:847c1800 r8:846ba72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:191:3878 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:191 state:D stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07a5d84 r8:00000002 r7:60000013 r6:e07a5d8c r5:847c2400 r4:847c2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c2400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d7dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85004b8c r4:85004800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85004b8c r4:846ba780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c2400 r8:846ba7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ba780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ba780 r8:8027f5e8 r7:e07a1e60 r6:8457c080 r5:847c2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07a5fb0 to 0xe07a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846dddc0 INFO: task kworker/1:191:3878 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d97fb000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:84b52f8c r4:84b52c00 r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) INFO: task kworker/1:192:3880 blocked for more than 453 seconds. r5:847c3000 r4:829188d8 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfab9000 r5:8500538c r4:85005000 r10:61c88647 r9:847c3000 r8:846ba82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:193:3882 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:193 state:D stack:0 pid:3882 tgid:3882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e05ddd84 r8:00000002 r7:60000113 r6:e05ddd8c r5:847c3c00 r4:847c3c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c3c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05dde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84693640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc5f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85005f8c r4:85005c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85005f8c r4:846ba880 r10:00000000 r9:846ba880 r8:8027f5e8 r7:e07a1e60 r6:8457c180 r5:847c3c00 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:84a7ddc0 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:846ba900 r8:8027f5e8 r7:e05dde60 r6:8457c200 r5:847c4800 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:195:3886 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:195 state:D stack:0 pid:3886 tgid:3886 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0651d84 r8:00000002 r7:60000113 r6:e0651d8c r5:847c5400 r4:847c5400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c5400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0651e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 r5:00001000 r4:e00ab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r9:83018205 r8:847c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe065dfb0 to 0xe065dff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e05e1dc0 r5:84b52f8c r4:84b52c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:197:3892 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:197 state:D stack:0 pid:3892 tgid:3892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e06ddd84 r8:00000002 r7:60000113 r6:e06ddd8c r5:850e9800 r4:850e9800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850e9800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06dde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84693f80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e018d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85007b8c r4:85007800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85007b8c r4:846baa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850e9800 r8:846baaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846baa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846baa80 r8:8027f5e8 r7:e0651e60 r6:8457c380 r5:850e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06ddfb0 to 0xe06ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84693780 INFO: task kworker/1:197:3892 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: da352000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 r4:82ac11e4 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:850ea400 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e00dd000 r5:8500678c r4:85006400 r7:ddde2d80 r6:83018200 r5:8500678c r4:846bab00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe05e1d28 to 0xe05e1d70) r4:e05e1dc0 r5:84b52f8c r4:84b52c00 r4:00000001 INFO: task kworker/1:199:3894 blocked for more than 453 seconds. [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84693b00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e010b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85006f8c r4:85006c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85006f8c r4:846ba680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850e8000 r8:846ba6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ba680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ba680 r8:8027f5e8 r7:e06dde60 r6:8457c480 r5:850e8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f5fb0 to 0xe06f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84693800 INFO: task kworker/1:199:3894 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: da980000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:200 state:D stack:0 pid:3896 tgid:3896 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:850e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:201:3898 blocked for more than 453 seconds. [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0151000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500738c r4:85007000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500738c r4:846bac80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850eb000 r8:846bacac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846bac80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846bac80 r8:8027f5e8 r7:e06dde60 r6:8457c580 r5:850eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0715fb0 to 0xe0715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84693b40 INFO: task kworker/1:201:3898 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: dad78000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:202 state:D stack:0 pid:3900 tgid:3900 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:850ebc00 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018205 r8:850ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 r5:00001000 r4:e017b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500778c r4:846bad00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ebc00 r8:846bad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846bad00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846bad00 r8:8027f5e8 r7:e06dde60 r6:8457c600 r5:850ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0731fb0 to 0xe0731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84693d00 INFO: task kworker/1:202:3900 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: daf3c000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:203:3902 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:203 state:D stack:0 pid:3902 tgid:3902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07add84 r8:00000002 r7:60000013 r6:e07add8c r5:850ec800 r4:850ec800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ec800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07ade08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490cb80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500938c r4:85009000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500938c r4:846bad80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ec800 r8:846badac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846bad80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846bad80 r8:8027f5e8 r7:e06dde60 r6:8457c680 r5:850ec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07adfb0 to 0xe07adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84693c80 INFO: task kworker/1:203:3902 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: db570000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:204:3904 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:204 state:D stack:0 pid:3904 tgid:3904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07b5d84 r8:00000002 r7:60000013 r6:e07b5d8c r5:850ed400 r4:850ed400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ed400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846afdc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01a3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85007f8c r4:85007c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85007f8c r4:846bae00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ed400 r8:846bae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846bae00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846bae00 r8:8027f5e8 r7:e07ade60 r6:8457c700 r5:850ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b5fb0 to 0xe07b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84693c80 INFO: task kworker/1:204:3904 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: db980000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:205:3906 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:205 state:D stack:0 pid:3906 tgid:3906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07b9d84 r8:00000002 r7:60000113 r6:e07b9d8c r5:850eec00 r4:850eec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850eec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d7980 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01bf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500878c r4:85008400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500878c r4:846bae80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850eec00 r8:846baeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846bae80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846bae80 r8:8027f5e8 r7:e07ade60 r6:8457c780 r5:850eec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b9fb0 to 0xe07b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846f5480 INFO: task kworker/1:205:3906 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: db980000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:206:3908 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:206 state:D stack:0 pid:3908 tgid:3908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07bdd84 r8:00000002 r7:60000013 r6:e07bdd8c r5:850ee000 r4:850ee000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ee000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07bde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490c580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0515000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85008f8c r4:85008c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85008f8c r4:846baf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ee000 r8:846baf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846baf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846baf00 r8:8027f5e8 r7:e07ade60 r6:8457c800 r5:850ee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07bdfb0 to 0xe07bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846afe40 INFO: task kworker/1:206:3908 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: dbd53000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:207:3912 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:207 state:D stack:0 pid:3912 tgid:3912 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e06f9d84 r8:00000002 r7:60000013 r6:e06f9d8c r5:84b7a400 r4:84b7a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b7a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490c780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0529000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500978c r4:85009400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500978c r4:8493b100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7a400 r8:8493b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493b100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493b100 r8:8027f5e8 r7:e07ade60 r6:8493b000 r5:84b7a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f9fb0 to 0xe06f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490c4c0 INFO: task kworker/1:207:3912 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:00000001 task:kworker/1:208 state:D stack:0 pid:3915 tgid:3915 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e0575000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8493b180 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:209:3917 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:209 state:D stack:0 pid:3917 tgid:3917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07c9d84 r8:00000002 r7:60000113 r6:e07c9d8c r5:84b7b000 r4:84b7b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b7b000 r4:829188d8 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:df9b4000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84b7b000 r8:8493b0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) r4:82ac11e4 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 r4:84b7bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07cde08 r5:00001000 r4:e05b5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8500a38c r4:8493b280 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 r5:00001000 r4:e01f9000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:211 state:D stack:0 pid:3921 tgid:3921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e075dd84 r8:00000002 r7:60000013 r6:e075dd8c r5:84b7d400 r4:84b7d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b7d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e075de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d7f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500ab8c r4:8500a800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500ab8c r4:8493b380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:8493b3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493b380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493b380 r8:8027f5e8 r7:e07c9e60 r6:8493b580 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe075dfb0 to 0xe075dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490cd40 INFO: task kworker/1:211:3921 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: dc970000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 r4:84b7e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c1e08 r5:00001000 r4:dfdaf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85009f8c r4:8493b480 Exception stack(0xe07c1fb0 to 0xe07c1ff8) r4:8490cc00 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: dc970000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:213:3925 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:213 state:D stack:0 pid:3925 tgid:3925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07d1d84 r8:00000002 r7:60000013 r6:e07d1d8c r5:84b7c800 r4:84b7c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b7c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846afe00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfc27000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8500af8c r4:8500ac00 r10:61c88647 r9:84b7c800 r8:8493b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 r4:84b7ec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d5e08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfd2d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500b38c r4:8500b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500b38c r4:8493b600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7ec00 r8:8493b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493b600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493b600 r8:8027f5e8 r7:e07c1e60 r6:8493b780 r5:84b7ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07d5fb0 to 0xe07d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490c100 INFO: task kworker/1:214:3927 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: dcea4000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:215:3930 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:215 state:D stack:0 pid:3930 tgid:3930 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07b1d84 r8:00000002 r7:60000113 r6:e07b1d8c r5:84b78000 r4:84b78000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b78000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490d680 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b78000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe41000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500bb8c r4:8500b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500bb8c r4:8493b800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b78000 r8:8493b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493b800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493b800 r8:8027f5e8 r7:e07c1e60 r6:8493b880 r5:84b78000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b1fb0 to 0xe07b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490d2c0 INFO: task kworker/1:215:3930 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe05e1d28 to 0xe05e1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:84b52f8c r4:84b52c00 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfe09000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:216:3931 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: dd3a2000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:217:3934 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:217 state:D stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07d9d84 r8:00000002 r7:60000113 r6:e07d9d8c r5:850a0000 r4:850a0000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dff4d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8493ba00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) r4:84a7ddc0 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:218 state:D stack:0 pid:3935 tgid:3935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07ddd84 r8:00000002 r7:60000013 r6:e07ddd8c r5:850a0c00 r4:850a0c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a0c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07dde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490d880 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501438c r4:85014000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501438c r4:8493bb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a0c00 r8:8493bb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493bb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493bb00 r8:8027f5e8 r7:e07d9e60 r6:8493bb80 r5:850a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07ddfb0 to 0xe07ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490d5c0 INFO: task kworker/1:218:3935 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e1d28 to 0xe05e1d70) r4:82ac11e4 r4:00000000 r5:00001000 r4:e01f9000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e1fb0 to 0xe05e1ff8) INFO: task kworker/1:219:3937 blocked for more than 453 seconds. [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dff99000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85014f8c r4:8493bc00 Exception stack(0xe07e9fb0 to 0xe07e9ff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:220:3939 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:220 state:D stack:0 pid:3939 tgid:3939 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07edd84 r8:00000002 r7:60000113 r6:e07edd8c r5:850a2400 r4:850a2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a2400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07ede08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490dac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff6f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85014b8c r4:85014800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85014b8c r4:8493bd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a2400 r8:8493bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8493bd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8493bd00 r8:8027f5e8 r7:e07e9e60 r6:8493bd80 r5:850a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07edfb0 to 0xe07edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490d9c0 INFO: task kworker/1:220:3939 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: dda6d000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e05d3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:850a3c00 r8:8493be2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ddf4f000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:222:3944 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:222 state:D stack:0 pid:3944 tgid:3944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07fdd84 r8:00000002 r7:60000113 r6:e07fdd8c r5:850a3000 r4:850a3000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a3000 r4:829188d8 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07fde08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8501538c r4:8493bf00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84778000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:00001000 r4:e06d9000 r7:dddced80 r6:83018000 r5:84b8a38c r4:8457c880 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: de2ae000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:223:3947 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:223 state:D stack:0 pid:3947 tgid:3947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0801d84 r8:00000002 r7:60000113 r6:e0801d8c r5:84779800 r4:84779800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84779800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0801e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d0340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84779800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ed000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85015f8c r4:85015c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85015f8c r4:84439100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84779800 r8:8443912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84439100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84439100 r8:8027f5e8 r7:e07f5e60 r6:8457c980 r5:84779800 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: de2ae000 e01b7000 00000001 80239b98 7f157000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:dfa8b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8501c38c r4:84439000 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849d0100 INFO: task kworker/1:224:3949 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: de4cf000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:225:3951 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:225 state:D stack:0 pid:3951 tgid:3951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0811d84 r8:00000002 r7:60000113 r6:e0811d8c r5:8477c800 r4:8477c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8477c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0811e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 r5:00001000 r4:e05ff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:226:3953 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:226 state:D stack:0 pid:3953 tgid:3953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0825d84 r8:00000002 r7:60000113 r6:e0825d8c r5:8477d400 r4:8477d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8477d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0825e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d00c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8477d400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e061b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501638c r4:85016000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501638c r4:84439080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8477d400 r8:844390ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84439080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84439080 r8:8027f5e8 r7:e0809e60 r6:8457cb00 r5:8477d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0825fb0 to 0xe0825ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:849d0400 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r4:e05e1dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7ddc0 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e063f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8501678c r4:84439200 r10:00000000 r9:84439200 r8:8027f5e8 r7:e0809e60 r6:8457cb80 r5:8477a400 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:228:3957 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:228 state:D stack:0 pid:3957 tgid:3957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0839d84 r8:00000002 r7:60000113 r6:e0839d8c r5:8477bc00 r4:8477bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8477bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0839e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d0800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8477bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0659000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85016b8c r4:85016800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85016b8c r4:84439280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8477bc00 r8:844392ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84439280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84439280 r8:8027f5e8 r7:e0809e60 r6:8457cc00 r5:8477bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0839fb0 to 0xe0839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849d0400 INFO: task kworker/1:228:3957 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: dedd5000 e01b7000 00000001 80239b98 7f157000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:229 state:D stack:0 pid:3959 tgid:3959 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e0681000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:230:3961 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:230 state:D stack:0 pid:3961 tgid:3961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0855d84 r8:00000002 r7:60000013 r6:e0855d8c r5:8477ec00 r4:8477ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8477ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0855e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d0a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8477ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06bd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501738c r4:85017000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501738c r4:84439400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8477ec00 r8:8443942c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84439400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84439400 r8:8027f5e8 r7:e0809e60 r6:8457cd00 r5:8477ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0855fb0 to 0xe0855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849d0040 INFO: task kworker/1:230:3961 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: dedd5000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:191 state:D stack:0 pid:3964 tgid:3964 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07f9d84 r8:00000002 r7:60000113 r6:e07f9d8c r5:8477e000 r4:8477e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8477e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847fb840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8477e000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0739000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b89f8c r4:84b89c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b89f8c r4:8457cd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8477e000 r8:8457cdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8457cd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:231 state:D stack:0 pid:3965 tgid:3965 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e0703000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85130000 r8:844394ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849d0980 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:232:3967 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:232 state:D stack:0 pid:3967 tgid:3967 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e085dd84 r8:00000002 r7:60000113 r6:e085dd8c r5:85130c00 r4:85130c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85130c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e085de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d0e00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85130c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e071f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85017f8c r4:85017c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85017f8c r4:84439380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85130c00 r8:844393ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84439380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84439380 r8:8027f5e8 r7:e0809e60 r6:8457cf00 r5:85130c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe085dfb0 to 0xe085dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 r4:850a6c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0805e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0773000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r4:00000000 r5:84b52f8c r4:84b52c00 r4:846ded00 1fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e0763000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b8ab8c r4:84790100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a6000 r8:8479012c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84790100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84790100 r8:8027f5e8 r7:e0569e60 r6:84439500 r5:850a6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0879fb0 to 0xe0879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847fb880 INFO: task kworker/0:192:3971 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: dfba6000 e01b7000 00000001 80239b98 7f157000 00000001 1d40: 82ac05a0 7f157000 e01b7000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:193:3973 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85131800 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfba7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85132400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c2880 r5:00001000 r4:dfa49000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b52f8c r4:84b52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84b52f8c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:235:3979 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:235 state:D stack:0 pid:3979 tgid:3979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e088dd84 r8:00000002 r7:60000113 r6:e088dd8c r5:850a4800 r4:850a4800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a4800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e088de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c2600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89b9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501c78c r4:8501c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501c78c r4:84439700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a4800 r8:8443972c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84439700 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dfc6b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b8b78c r4:84790280 5fa0: 00000000 00000000 00000000 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0899e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d0b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e013d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8441578c r4:84415400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8441578c r4:84790380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a8000 r8:847903ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84790380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84790380 r8:8027f5e8 r7:e0569e60 r6:84439880 r5:850a8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0899fb0 to 0xe0899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847fbd80 INFO: task kworker/0:195:3982 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 7f4c7000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 90000013 ffffffff r5:90000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e00cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:850a9800 r8:8479042c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 1d20: 7fe1a000 ece39000 00000001 80239b98 7f159000 00000001 r4:e05e1dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:197:3986 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:197 state:D stack:0 pid:3986 tgid:3986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08a9d84 r8:00000002 r7:60000113 r6:e08a9d8c r5:850a8c00 r4:850a8c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a8c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08a9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84929940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e010d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b8bf8c r4:84b8bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b8bf8c r4:84790480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a8c00 r8:847904ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84790480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84790480 r8:8027f5e8 r7:e0899e60 r6:84439980 r5:850a8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08a9fb0 to 0xe08a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84929100 INFO: task kworker/0:197:3986 is blocked on a mutex likely owned by task kworker/1:152:3800. r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:198:3988 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e05a7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85121b8c r4:84790300 r10:00000000 r9:84790300 r8:8027f5e8 r7:e0899e60 r6:84439a00 r5:850aa400 Workqueue: events bpf_prog_free_deferred 1d20: 7ff3d000 ece39000 00000001 80239b98 7f159000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e016d000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:200:3992 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:200 state:D stack:0 pid:3992 tgid:3992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08b9d84 r8:00000002 r7:60000113 r6:e08b9d8c r5:850ac800 r4:850ac800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ac800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08b9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8499c400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0193000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8442af8c r4:8442ac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8442af8c r4:84790200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ac800 r8:8479022c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84790200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84790200 r8:8027f5e8 r7:e08b1e60 r6:84439b00 r5:850ac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08b9fb0 to 0xe08b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499c040 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:201:3994 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:201 state:D stack:0 pid:3994 tgid:3994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08bdd84 r8:00000002 r7:60000013 r6:e08bdd8c r5:850ad400 r4:850ad400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ad400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08bde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8499c4c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01ad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512038c r4:85120000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8512038c r4:84790600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ad400 r8:8479062c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84790600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e01d7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85120b8c r4:84790580 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e0506000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85120f8c r4:84790680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850aec00 r8:847906ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84790680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84790680 r8:8027f5e8 r7:e08b1e60 r6:84439c80 r5:850aec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08e9fb0 to 0xe08e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499c440 INFO: task kworker/0:203:3998 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 80b94000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:204:4000 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:204 state:D stack:0 pid:4000 tgid:4000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08edd84 r8:00000002 r7:60000013 r6:e08edd8c r5:850ab000 r4:850ab000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ab000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08ede08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8499c800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0521000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512138c r4:85121000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8512138c r4:84790780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ab000 r8:847907ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84790780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84790780 r8:8027f5e8 r7:e08b1e60 r6:84439d00 r5:850ab000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08edfb0 to 0xe08edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499c800 INFO: task kworker/0:204:4000 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 r5:85c3938c r4:85c39000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08f1e08 r5:00001000 r4:e0573000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8512178c r4:84790800 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e1dc0 r5:00001000 r4:eced5000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b0c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08f5e08 r5:00001000 r4:e0785000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85122b8c r4:84790880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84790880 r8:8027f5e8 r7:e08b1e60 r6:84439e00 r5:850b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08f5fb0 to 0xe08f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499c940 INFO: task kworker/0:206:4004 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 810cc000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:207:4007 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4905e08 r5:00001000 r4:e05bd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8512078c r4:85120400 r4:84790900 5fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850b1800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4911e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85121f8c r4:84790980 Exception stack(0xe4911fb0 to 0xe4911ff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:209:4010 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:209 state:D stack:0 pid:4010 tgid:4010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0889d84 r8:00000002 r7:60000113 r6:e0889d8c r5:85133c00 r4:85133c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85133c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0889e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8499cf00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85133c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512238c r4:85122000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8512238c r4:84790700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85133c00 r8:8479072c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84790700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84790700 r8:8027f5e8 r7:e08f5e60 r6:84790a80 r5:85133c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0889fb0 to 0xe0889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499ce80 INFO: task kworker/0:209:4010 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 81abb000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r4:e05e1dc0 r5:00001000 r4:eced5000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e071b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85135400 r8:84790a2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4915e08 r9:83018005 r8:85136000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 r5:00001000 r4:e00f1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504038c r4:85040000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504038c r4:84790b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85136000 r8:84790b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84790b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84790b00 r8:8027f5e8 r7:e08f5e60 r6:84790c80 r5:85136000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4915fb0 to 0xe4915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492d0c0 INFO: task kworker/0:211:4015 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 81d9e000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:212:4016 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:212 state:D stack:0 pid:4016 tgid:4016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492d340 r5:00001000 r4:e07e1000 r5:85122f8c r4:85122c00 r4:84790c00 1fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 r4:85134800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e491de08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85134800 r8:84790dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84790d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84790d80 r8:8027f5e8 r7:e4915e60 r6:84790e00 r5:85134800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe491dfb0 to 0xe491dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492d380 INFO: task kworker/0:213:4019 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 824b4000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:214:4021 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:214 state:D stack:0 pid:4021 tgid:4021 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e4925d84 r8:00000002 r7:60000113 r6:e4925d8c r5:85133000 r4:85133000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85133000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:e08c1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8512378c r4:84790e80 Exception stack(0xe4925fb0 to 0xe4925ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e1d28 to 0xe05e1d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:215:4023 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:215 state:D stack:0 pid:4023 tgid:4023 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492d800 r5:00001000 r4:e492f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85123b8c r4:84695100 dfa0: 00000000 00000000 00000000 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:85c3938c r4:85c39000 r4:846ded00 1fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8442bf8c r4:8442bc00 r10:61c88647 r9:849c0000 r8:846950ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8492d740 Workqueue: events bpf_prog_free_deferred 1d20: 82723000 ece39000 00000001 80239b98 7f159000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:217:4027 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:217 state:D stack:0 pid:4027 tgid:4027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e4945d84 r8:00000002 r7:60000113 r6:e4945d8c r5:849c0c00 r4:849c0c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c0c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4945e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492da40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4947000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85123f8c r4:85123c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85123f8c r4:84695180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c0c00 r8:846951ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84695180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84695180 r8:8027f5e8 r7:e4915e60 r6:84695300 r5:849c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4945fb0 to 0xe4945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 r4:849c1800 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8492dc80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4953000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512438c r4:85124000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8512438c r4:84695280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c1800 r8:846952ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84695280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84695280 r8:8027f5e8 r7:e4915e60 r6:84695400 r5:849c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4951fb0 to 0xe4951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8492da80 INFO: task kworker/0:218:4029 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 82ab5000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 Not tainted 6.15.0-syzkaller #0 r4:849c2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e495de08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8512478c r4:85124400 r7:dddced80 r6:83018000 r5:8512478c r4:84695380 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8492db00 INFO: task kworker/0:219:4031 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 8312c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:00000000 r5:85c3938c r4:85c39000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849c3000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4969e08 r5:00001000 r4:e496b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:220:4033 is blocked on a mutex likely owned by task kworker/1:152:3800. 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e4977000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85124b8c r4:84695600 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4975fb0 to 0xe4975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499cfc0 INFO: task kworker/0:221:4035 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 833af000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:222:4036 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:222 state:D stack:0 pid:4036 tgid:4036 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e4921d84 r8:00000002 r7:60000113 r6:e4921d8c r5:849c4800 r4:849c4800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c4800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4921e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c5000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 r5:00001000 r4:e8981000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84695680 r8:8027f5e8 r7:e4915e60 r6:84695780 r5:849c4800 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:00001000 r4:eced5000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:223:4039 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:223 state:D stack:0 pid:4039 tgid:4039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e8985d84 r8:00000002 r7:60000113 r6:e8985d8c r5:849c5400 r4:849c5400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c5400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8985e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c5040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8995000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512578c r4:85125400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8512578c r4:84695800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c5400 r8:8469582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84695800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84695800 r8:8027f5e8 r7:e4915e60 r6:84695880 r5:849c5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8985fb0 to 0xe8985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:e898dd84 r8:00000002 r7:60000013 r6:e898dd8c r5:849c6000 r4:00000000 r4:00000000 r5:00001000 r4:e89a1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85125f8c r4:85125c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85125f8c r4:84695980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c6000 r8:846959ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84695980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84695980 r8:8027f5e8 r7:e4915e60 r6:84695900 r5:849c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe898dfb0 to 0xe898dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c5440 INFO: task kworker/0:224:4040 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 8377d000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89ade08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c56c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85138000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89a9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85125b8c r4:85125800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85125b8c r4:84695b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85138000 r8:84695b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84695b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84695b00 r8:8027f5e8 r7:e4915e60 r6:84695a00 r5:85138000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89adfb0 to 0xe89adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85139800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:85c3938c r4:85c39000 r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 r4:850b2400 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e899de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c2800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9bf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501cf8c r4:8501cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501cf8c r4:84439f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b2400 r8:84439fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84439f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84439f80 r8:8027f5e8 r7:e0881e60 r6:846bac00 r5:850b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe899dfb0 to 0xe899dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c2480 INFO: task kworker/1:236:4046 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 83c56000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:84a7ddc0 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dfcc9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8501d38c r4:846df100 Exception stack(0xe89c1fb0 to 0xe89c1ff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89d9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84814140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85138c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512638c r4:85126000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8512638c r4:84695b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85138c00 r8:84695bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84695b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84695b80 r8:8027f5e8 r7:e4915e60 r6:84695d00 r5:85138c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89d9fb0 to 0xe89d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c5a00 INFO: task kworker/0:227:4052 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 84022000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:238:4053 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:238 state:D stack:0 pid:4053 tgid:4053 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89dde08 r5:00001000 r4:dfd65000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8501d78c r4:846df080 Exception stack(0xe89ddfb0 to 0xe89ddff8) INFO: task kworker/1:238:4053 is blocked on a mutex likely owned by task kworker/1:152:3800. 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:239:4055 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:239 state:D stack:0 pid:4055 tgid:4055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e89e5d84 r8:00000002 r7:60000113 r6:e89e5d8c r5:8513c800 r4:8513c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8513c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89e5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 r5:00001000 r4:dfddf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 task:kworker/1:240 state:D stack:0 pid:4057 tgid:4057 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfe69000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:241:4059 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:241 state:D stack:0 pid:4059 tgid:4059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e89f5d84 r8:00000002 r7:60000013 r6:e89f5d8c r5:8513a400 r4:8513a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8513a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89f5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84822240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8513a400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501ef8c r4:8501ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501ef8c r4:846df300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513a400 r8:846df32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846df300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846df300 r8:8027f5e8 r7:dfa31e60 r6:84695e80 r5:8513a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89f5fb0 to 0xe89f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c2bc0 INFO: task kworker/1:241:4059 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 84c9c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa09e08 r5:00001000 r4:dff65000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8501e78c r4:846df380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05e1fb0 to 0xe05e1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:243:4062 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:243 state:D stack:0 pid:4062 tgid:4062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa0dd84 r8:00000002 r7:60000113 r6:eaa0dd8c r5:8513ec00 r4:8513ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8513ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa0de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490db00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8513ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff9b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85126b8c r4:85126800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85126b8c r4:846df180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513ec00 r8:846df1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846df180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846df180 r8:8027f5e8 r7:e89f5e60 r6:84695f80 r5:8513ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa0dfb0 to 0xeaa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c2400 INFO: task kworker/1:243:4062 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 850f0000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:244:4065 blocked for more than 455 seconds. r4:8513e000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e05f7000 r5:8501f78c r4:8501f400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:244:4065 is blocked on a mutex likely owned by task kworker/1:152:3800. 1d60: 80230ad4 80239bb0 80000013 ffffffff [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) Exception stack(0xe05e1fb0 to 0xe05e1ff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa25d84 r8:00000002 r7:60000013 r6:eaa25d8c r5:84948c00 r4:84948c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84948c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa25e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ae040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84948c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00db000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501eb8c r4:8501e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501eb8c r4:846df480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84948c00 r8:846df4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846df480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846df480 r8:8027f5e8 r7:eaa11e60 r6:848d0000 r5:84948c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa25fb0 to 0xeaa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ae140 INFO: task kworker/1:245:4068 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 850f0000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:246:4070 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:246 state:D stack:0 pid:4070 tgid:4070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa29d84 r8:00000002 r7:60000013 r6:eaa29d8c r5:84949800 r4:84949800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84949800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa29e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ae8c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84949800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501f38c r4:8501f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501f38c r4:846df580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84949800 r8:846df5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846df580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846df580 r8:8027f5e8 r7:eaa11e60 r6:848d0080 r5:84949800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa29fb0 to 0xeaa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ae080 INFO: task kworker/1:246:4070 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 85a99000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:247:4072 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:247 state:D stack:0 pid:4072 tgid:4072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa2dd84 r8:00000002 r7:60000013 r6:eaa2dd8c r5:8494a400 r4:8494a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8494a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa2de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ae5c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8494a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0605000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501fb8c r4:8501f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501fb8c r4:846df500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8494a400 r8:846df52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846df500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846df500 r8:8027f5e8 r7:eaa29e60 r6:848d0180 r5:8494a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa2dfb0 to 0xeaa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ae400 INFO: task kworker/1:247:4072 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 85a99000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:248:4073 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:248 state:D stack:0 pid:4073 tgid:4073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa31d84 r8:00000002 r7:60000013 r6:eaa31d8c r5:8494b000 r4:8494b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8494b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa31e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ae640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8494b000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e063b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501ff8c r4:8501fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8501ff8c r4:846df680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8494b000 r8:846df6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846df680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846df680 r8:8027f5e8 r7:eaa29e60 r6:848d0200 r5:8494b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa31fb0 to 0xeaa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ae500 INFO: task kworker/1:248:4073 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 85d89000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:249:4075 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:249 state:D stack:0 pid:4075 tgid:4075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa35d84 r8:00000002 r7:60000113 r6:eaa35d8c r5:8494bc00 r4:8494bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8494bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa35e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ae3c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8494bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0665000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8471038c r4:84710000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471038c r4:846df700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8494bc00 r8:846df72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846df700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846df700 r8:8027f5e8 r7:eaa29e60 r6:848d0280 r5:8494bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:00000000 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e1fb0 to 0xe05e1ff8) r4:84a7ddc0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8494c800 r4:829188d8 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa39e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443acc0 r5:00001000 r4:e0833000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846df600 r8:8027f5e8 r7:eaa29e60 r6:848d0300 r5:8494c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa39fb0 to 0xeaa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ae780 INFO: task kworker/1:250:4077 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 85f51000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:251:4079 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:251 state:D stack:0 pid:4079 tgid:4079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa41d84 r8:00000002 r7:60000113 r6:eaa41d8c r5:8494e000 r4:8494e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8494e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e06cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516c38c r4:8516c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r4:846ded00 r4:00000001 Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:252:4081 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:252 state:D stack:0 pid:4081 tgid:4081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa49d84 r8:00000002 r7:60000013 r6:eaa49d8c r5:8494d400 r4:8494d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8494d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa49e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846aeb40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8494d400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0705000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516c78c r4:8516c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516c78c r4:846df800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8494d400 r8:846df82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846df800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846df800 r8:8027f5e8 r7:eaa39e60 r6:848d0400 r5:8494d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa49fb0 to 0xeaa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ae940 INFO: task kworker/1:252:4081 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 864b5000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:253:4083 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:253 state:D stack:0 pid:4083 tgid:4083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa55d84 r8:00000002 r7:60000113 r6:eaa55d8c r5:849c6c00 r4:849c6c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c6c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa55e08 r4:00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e072d000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:849c6c00 r8:846df8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:846df880 r8:8027f5e8 r7:eaa39e60 r6:848d0480 r5:849c6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa55fb0 to 0xeaa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ae880 INFO: task kworker/1:253:4083 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 86a34000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:254:4085 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:254 state:D stack:0 pid:4085 tgid:4085 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa5dd84 r8:00000002 r7:60000013 r6:eaa5dd8c r5:85150000 r4:85150000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85150000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa5de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846aee00 r5:00001000 r4:e0759000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516cf8c r4:8516cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516cf8c r4:846df980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85150000 r8:846df9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846df980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846df980 r8:8027f5e8 r7:eaa39e60 r6:848d0500 r5:85150000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa5dfb0 to 0xeaa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ae940 INFO: task kworker/1:254:4085 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 86a34000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:255:4087 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:255 state:D stack:0 pid:4087 tgid:4087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa65d84 r8:00000002 r7:60000113 r6:eaa65d8c r5:85151800 r4:85151800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85151800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa65e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846aef00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85151800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0775000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516d38c r4:8516d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516d38c r4:846df900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85151800 r8:846df92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846df900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846df900 r8:8027f5e8 r7:eaa39e60 r6:848d0580 r5:85151800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa65fb0 to 0xeaa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846aee40 INFO: task kworker/1:255:4087 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84a7ddc0 task:kworker/1:256 state:D stack:0 pid:4089 tgid:4089 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e081f000 r7:ddde2d80 r6:83018200 r5:8516d78c r4:846dfa00 Exception stack(0xeaa6dfb0 to 0xeaa6dff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829188dc r9:eaa75d84 r8:00000002 r7:60000113 r6:eaa75d8c r5:85152400 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849313c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85152400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516eb8c r4:8516e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516eb8c r4:846dfb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85152400 r8:846dfb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846dfb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846dfb00 r8:8027f5e8 r7:eaa39e60 r6:848d0680 r5:85152400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa75fb0 to 0xeaa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846aedc0 INFO: task kworker/1:257:4091 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 871c7000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 INFO: task kworker/1:258:4093 blocked for more than 455 seconds. r5:85154800 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e89f7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85154800 r8:846dfbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r4:00000001 Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:259:4095 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:259 state:D stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa85d84 r8:00000002 r7:60000013 r6:eaa85d8c r5:85153c00 r4:85153c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85153c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa85e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84931040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85153c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa19000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516e38c r4:8516e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516e38c r4:846dfc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85153c00 r8:846dfc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846dfc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846dfc00 r8:8027f5e8 r7:eaa75e60 r6:848d0780 r5:85153c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa85fb0 to 0xeaa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c5b00 INFO: task kworker/1:259:4095 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 8761c000 ece39000 00000001 80239b98 7f159000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eaa99d84 r8:00000002 r7:60000113 r6:eaa99d8c r5:85153000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eaa91000 r5:8516e78c r4:8516e400 r4:846dfc80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:261:4099 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:261 state:D stack:0 pid:4099 tgid:4099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaaa5d84 r8:00000002 r7:60000113 r6:eaaa5d8c r5:85155400 r4:85155400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85155400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84810580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85155400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa73000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85174f8c r4:85174c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85174f8c r4:846dfd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85155400 r8:846dfd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846dfd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05e1fb0 to 0xe05e1ff8) INFO: task kworker/1:262:4101 blocked for more than 455 seconds. r4:8494ec00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eaab5000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:263:4103 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:263 state:D stack:0 pid:4103 tgid:4103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaac5d84 r8:00000002 r7:60000013 r6:eaac5d8c r5:85156000 r4:85156000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85156000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84931640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85156000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516ef8c r4:8516ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516ef8c r4:846dfe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85156000 r8:846dfe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846dfe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846dfe00 r8:8027f5e8 r7:eaaa5e60 r6:848d0980 r5:85156000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac5fb0 to 0xeaac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849315c0 INFO: task kworker/1:263:4103 is blocked on a mutex likely owned by task kworker/1:152:3800. Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r4:00000000 r5:85c3938c r4:85c39000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-syzkaller #0 r4:85156c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaacde08 r5:00001000 r4:eaad1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8516f78c r4:846dfe80 Exception stack(0xeaacdfb0 to 0xeaacdff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:265 state:D stack:0 pid:4107 tgid:4107 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829188dc r9:e89d1d84 r8:00000002 r7:60000113 r6:e89d1d8c r5:850b5400 r4:850b5400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b5400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89d1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84931c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516ff8c r4:8516fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8516ff8c r4:846dff00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b5400 r8:846dff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846dff00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846dff00 r8:8027f5e8 r7:eaaa5e60 r6:846dff80 r5:850b5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89d1fb0 to 0xe89d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84931840 INFO: task kworker/1:265:4107 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 88206000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaede08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:848d0a80 r8:8027f5e8 r7:e4915e60 r6:846dfa80 r5:850b6c00 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:850b6000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b6000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84931c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab05000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500bf8c r4:8500bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8500bf8c r4:847fd100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b6000 r8:847fd12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847fd100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd100 r8:8027f5e8 r7:eaaa5e60 r6:847fd080 r5:850b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf9fb0 to 0xeaaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84931b40 INFO: task kworker/1:266:4112 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 88644000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a7ddc0 task:kworker/1:267 state:D stack:0 pid:4114 tgid:4114 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eab0d000 r7:ddde2d80 r6:83018200 r5:8516fb8c r4:847fd000 Exception stack(0xeaabdfb0 to 0xeaabdff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 r5:84948000 r4:829188d8 r4:00000000 r4:00000000 r5:00001000 r4:eab19000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517438c r4:85174000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517438c r4:847fd280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84948000 r8:847fd2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847fd280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd280 r8:8027f5e8 r7:eaaa5e60 r6:847fd180 r5:84948000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe89cdfb0 to 0xe89cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84810000 INFO: task kworker/1:268:4117 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 88971000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:269:4119 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:269 state:D stack:0 pid:4119 tgid:4119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab21d84 r8:00000002 r7:60000113 r6:eab21d8c r5:850b8000 r4:850b8000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b8000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848100c0 r5:00001000 r4:eab25000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeab21fb0 to 0xeab21ff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eab39d84 r8:00000002 r7:60000113 r6:eab39d8c r5:84988000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eab45000 r7:dddced80 r6:83018000 r5:8512738c r4:848d0b80 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 88fe0000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:270:4122 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:270 state:D stack:0 pid:4122 tgid:4122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab3dd84 r8:00000002 r7:60000013 r6:eab3dd8c r5:84988c00 r4:84988c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84988c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab3de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84810380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eab31000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8517478c r4:847fd380 Exception stack(0xeab3dfb0 to 0xeab3dff8) Workqueue: events bpf_prog_free_deferred r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e01c1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:272:4126 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:272 state:D stack:0 pid:4126 tgid:4126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08f9d84 r8:00000002 r7:60000113 r6:e08f9d8c r5:8498bc00 r4:8498bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8498bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08f9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84810680 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8498bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb33000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517538c r4:85175000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517538c r4:847fd480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498bc00 r8:847fd4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847fd480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd480 r8:8027f5e8 r7:eab41e60 r6:848d0d00 r5:8498bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08f9fb0 to 0xe08f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84810140 INFO: task kworker/1:272:4126 is blocked on a mutex likely owned by task kworker/1:152:3800. r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e1dc0 r5:00001000 r4:eced5000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:273 state:D stack:0 pid:4128 tgid:4128 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848107c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8498b000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc1b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517578c r4:85175400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517578c r4:847fd600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498b000 r8:847fd62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847fd600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd600 r8:8027f5e8 r7:eab41e60 r6:848d0e00 r5:8498b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4935fb0 to 0xe4935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848106c0 INFO: task kworker/1:273:4128 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 8989c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84810900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8498c800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e009b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85175b8c r4:85175800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85175b8c r4:847fd680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498c800 r8:847fd6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847fd680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd680 r8:8027f5e8 r7:eab41e60 r6:848d0d80 r5:8498c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe494dfb0 to 0xe494dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84810140 INFO: task kworker/1:274:4130 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 89a42000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 INFO: task kworker/1:275:4132 blocked for more than 455 seconds. r10:829188dc r9:eab2dd84 r8:00000002 r7:60000013 r6:eab2dd8c r5:850b8c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84810ac0 r5:00001000 r4:e00e5000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:850b8c00 r8:847fd72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84810940 INFO: task kworker/1:275:4132 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 89f04000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:276:4135 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:276 state:D stack:0 pid:4135 tgid:4135 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4959e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0121000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8517638c r4:847fd780 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:85c3938c r4:85c39000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:e4965d84 r8:00000002 r7:60000113 r6:e4965d8c r5:850bb000 r4:00000000 r4:00000000 r5:00001000 r4:e016b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517678c r4:85176400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517678c r4:847fd800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850bb000 r8:847fd82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847fd800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd800 r8:8027f5e8 r7:eab41e60 r6:847fd980 r5:850bb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4965fb0 to 0xe4965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84810c80 INFO: task kworker/1:277:4137 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 8a133000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84810f40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e019b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85176b8c r4:85176800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85176b8c r4:847fd900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850bbc00 r8:847fd92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847fd900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fd900 r8:8027f5e8 r7:eab41e60 r6:847fda80 r5:850bbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4971fb0 to 0xe4971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84810e00 INFO: task kworker/1:278:4139 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 8a55b000 ece39000 00000001 80239b98 7f159000 00000001 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r5:85c3938c r4:85c39000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f7000 r7:ddde2d80 r6:83018200 r5:8517738c r4:847fda00 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 8a55b000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:280:4142 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:280 state:D stack:0 pid:4142 tgid:4142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab51d84 r8:00000002 r7:60000113 r6:eab51d8c r5:850bd400 r4:850bd400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850bd400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c5a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0527000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85177b8c r4:85177800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85177b8c r4:847fdb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850bd400 r8:847fdb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847fdb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fdb00 r8:8027f5e8 r7:e497de60 r6:847fdc80 r5:850bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab51fb0 to 0xeab51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a7ddc0 task:kworker/1:281 state:D stack:0 pid:4144 tgid:4144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab55d84 r8:00000002 r7:60000013 r6:eab55d8c r5:850be000 r4:850be000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850be000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab55e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b94840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850be000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0783000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517cf8c r4:8517cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517cf8c r4:847fdc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850be000 r8:847fdc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847fdc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fdc00 r8:8027f5e8 r7:eab51e60 r6:847fdd80 r5:850be000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab55fb0 to 0xeab55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c5940 INFO: task kworker/1:281:4144 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 8afcd000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:282:4146 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:282 state:D stack:0 pid:4146 tgid:4146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab15d84 r8:00000002 r7:60000113 r6:eab15d8c r5:850bec00 r4:850bec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850bec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab15e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b94100 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e057d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85177f8c r4:85177c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85177f8c r4:847fdd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850bec00 r8:847fdd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847fdd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fdd00 r8:8027f5e8 r7:eab55e60 r6:847fde00 r5:850bec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab15fb0 to 0xeab15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c59c0 INFO: task kworker/1:282:4146 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 8afcd000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:283:4148 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:283 state:D stack:0 pid:4148 tgid:4148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab59d84 r8:00000002 r7:60000113 r6:eab59d8c r5:850b9800 r4:850b9800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850b9800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab59e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b94300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05bb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517778c r4:85177400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517778c r4:847fde80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b9800 r8:847fdeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847fde80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847fde80 r8:8027f5e8 r7:eab55e60 r6:847fdf80 r5:850b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab59fb0 to 0xeab59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b940c0 INFO: task kworker/1:283:4148 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 8afcd000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:284:4150 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:284 state:D stack:0 pid:4150 tgid:4150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab5dd84 r8:00000002 r7:60000113 r6:eab5dd8c r5:851a0000 r4:851a0000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab5de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b94480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0669000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517c38c r4:8517c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517c38c r4:84b90100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a0000 r8:84b9012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b90100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b90100 r8:8027f5e8 r7:eab55e60 r6:84b90000 r5:851a0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab5dfb0 to 0xeab5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b94340 INFO: task kworker/1:284:4150 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 8b775000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851a0c00 r4:829188d8 r5:00001000 r4:e070b000 Exception stack(0xeab61fb0 to 0xeab61ff8) r4:82ac11e4 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:286:4154 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:286 state:D stack:0 pid:4154 tgid:4154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab65d84 r8:00000002 r7:60000113 r6:eab65d8c r5:851a1800 r5:00001000 r4:e0865000 r10:61c88647 r9:851a1800 r8:84b901ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) INFO: task kworker/1:287:4156 blocked for more than 455 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab69d84 r8:00000002 r7:60000113 r6:eab69d8c r5:851a2400 r4:851a2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a2400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab69e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b94900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 r5:00001000 r4:e0817000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517c78c r4:8517c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 r4:82ac11e4 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 Not tainted 6.15.0-syzkaller #0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:289:4160 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:289 state:D stack:0 pid:4160 tgid:4160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab71d84 r8:00000002 r7:60000113 r6:eab71d8c r5:851a3c00 r4:851a3c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a3c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab71e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018205 r8:851a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e089d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517d38c r4:8517d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517d38c r4:84b90500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:e05e1dc0 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:829188dc r9:eab79d84 r8:00000002 r7:60000113 r6:eab79d8c r5:851a5400 r5:00001000 r4:e08fb000 r10:61c88647 r9:851a5400 r8:84b9062c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1d20: 8c80f000 ece39000 00000001 80239b98 7f159000 00000001 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851a6000 r5:00001000 r4:e4919000 r7:ddde2d80 r6:83018200 r5:8517e38c r4:84b90680 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 8c80f000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Call trace: [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:00000000 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r7:ddde2d80 r6:83018200 r5:8517ef8c r4:84b90900 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:294:4170 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:294 state:D stack:0 pid:4170 tgid:4170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab89d84 r8:00000002 r7:60000113 r6:eab89d8c r5:851a8000 r4:851a8000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a8000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e89a7000 r10:61c88647 r9:851a8000 r8:84b909ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:00001000 r4:e89bb000 Exception stack(0xeab91fb0 to 0xeab91ff8) r4:84b28000 INFO: task kworker/1:295:4172 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 8d760000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/1:296 state:D stack:0 pid:4175 tgid:4175 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eabdd000 r10:00000000 r9:84b90b80 r8:8027f5e8 r7:eab91e60 r6:848d0f00 r5:84989800 r5:80000013 r4:80239bb0 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 r5:00001000 r4:eced5000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:00001000 r4:e89c9000 r7:ddde2d80 r6:83018200 r5:8517fb8c r4:84b90c00 Exception stack(0xe05e1d28 to 0xe05e1d70) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517ff8c r4:8517fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8517ff8c r4:84b90d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a9800 r8:84b90d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b90d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b90d00 r8:8027f5e8 r7:eaba1e60 r6:84b90d80 r5:851a9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b28a80 INFO: task kworker/1:298:4178 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 1d60: 80230ad4 80239bb0 80000013 ffffffff [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ab000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r5:00001000 r4:eabc5000 1fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 8e4e0000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:301:4184 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:301 state:D stack:0 pid:4184 tgid:4184 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:851ac800 r4:829188d8 r9:83018205 r8:851ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 r7:ddde2d80 r6:83018200 r5:85084f8c r4:84b90f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ac800 r8:84b90f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b90f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b90f00 r8:8027f5e8 r7:eaba1e60 r6:846baf80 r5:851ac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab95fb0 to 0xeab95ff8) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: 8e4e0000 ece39000 00000001 80239b98 7f159000 00000001 r5:00001000 r4:eced5000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ad400 r9:83018205 r8:851ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 r7:ddde2d80 r6:83018200 r5:85085b8c r4:84b2e100 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 8ea29000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/1:303 state:D stack:0 pid:4188 tgid:4188 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eabe9000 r10:61c88647 r9:851ae000 r8:84b2e0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1d20: 8ea29000 ece39000 00000001 80239b98 7f159000 00000001 r4:846ded00 INFO: task kworker/1:304:4190 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:304 state:D stack:0 pid:4190 tgid:4190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eabe5d84 r8:00000002 r7:60000113 r6:eabe5d8c r5:851aec00 r4:851aec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851aec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eabf5000 r5:8508538c r4:85085000 5fa0: 00000000 00000000 00000000 00000000 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:eac05000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r5:80000013 r4:80239bb0 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515b000 r5:00001000 r4:eac11000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508638c r4:85086000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8508638c r4:84b2e400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515b000 r8:84b2e42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b2e400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2e400 r8:8027f5e8 r7:eabcde60 r6:8457cf80 r5:8515b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac15fb0 to 0xeac15ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac25e08 r5:00001000 r4:eac1d000 r4:00000001 Call trace: r4:00000000 r4:00000001 r10:829188dc r9:eac31d84 r8:00000002 r7:60000113 r6:eac31d8c r5:8515bc00 r7:ddde2d80 r6:83018200 r5:8508c78c r4:84b2e500 r4:84b34a40 INFO: task kworker/1:308:4199 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 8f424000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000000 r5:00001000 r4:dfa11000 r4:84b41100 Workqueue: events bpf_prog_free_deferred r4:e05e1dc0 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515d400 r5:8515d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac0de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b34d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8515d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa67000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85086b8c r4:85086800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeac0dfb0 to 0xeac0dff8) 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r7:dddced80 r6:83018000 r5:8442bb8c r4:84b41280 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfd55000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508738c r4:85087000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8508738c r4:84b2e580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515a400 r8:84b2e5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b2e580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2e580 r8:8027f5e8 r7:eac31e60 r6:84b41380 r5:8515a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa8dfb0 to 0xeaa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b34c80 INFO: task kworker/1:310:4207 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05e1dc0 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515ec00 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:61c88647 r9:851b0000 r8:84b2e62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b28f40 INFO: task kworker/1:312:4211 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 90096000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r5:851b1800 r4:829188d8 r5:00001000 r4:dff63000 r7:ddde2d80 r6:83018200 r5:8508778c r4:84b2e700 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851b2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851b2400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac51e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b94780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff9f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85087f8c r4:85087c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85087f8c r4:84b2e800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b2400 r8:84b2e82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b2e800 Exception stack(0xeac51fb0 to 0xeac51ff8) 1d60: 80230ad4 80239bb0 80000013 ffffffff [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:8517f78c r4:84b2e900 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:846ded00 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac55e08 r5:00001000 r4:e05eb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508c38c r4:8508c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8508c38c r4:84b2ea80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b3c00 r8:84b2eaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b2ea80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b2ea80 r8:8027f5e8 r7:eac31e60 r6:84b2eb00 r5:851b3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac55fb0 to 0xeac55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b44080 INFO: task kworker/1:316:4220 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e1d28 to 0xe05e1d70) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r9:83018205 r8:851b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r4:84b2eb80 r4:84b443c0 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:829188dc r9:eac59d84 r8:00000002 r7:60000113 r6:eac59d8c r5:851b5400 r5:00001000 r4:e0645000 r4:84b2ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac59fb0 to 0xeac59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b44000 INFO: task kworker/1:318:4223 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 90eb0000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b6000 r9:83018205 r8:851b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05e1d28 to 0xe05e1d70) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r4:84a7ddc0 r5:851b6c00 r4:829188d8 r5:00001000 r4:e0751000 r10:61c88647 r9:851b6c00 r8:84b2eeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:321 state:D stack:0 pid:4229 tgid:4229 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e0719000 r10:61c88647 r9:851b0c00 r8:84b2ef2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e1d28 to 0xe05e1d70) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r9:83018205 r8:851a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:846ded00 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:323:4233 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:323 state:D stack:0 pid:4233 tgid:4233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac75d84 r8:00000002 r7:60000113 r6:eac75d8c r5:851aa400 r4:851aa400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851aa400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac75e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529f480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 r5:00001000 r4:e89f1000 r4:85295100 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05e1dc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/1:324 state:D stack:0 pid:4235 tgid:4235 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e0827000 r7:ddde2d80 r6:83018200 r5:8508df8c r4:85295200 Workqueue: events bpf_prog_free_deferred [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:84a7ddc0 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529f080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84981800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0845000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508e78c r4:8508e400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8508e78c r4:85295300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84981800 r8:8529532c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295300 r8:8027f5e8 r7:eac75e60 r6:84b41480 r5:84981800 r4:00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:00001000 r4:e89e1000 r10:61c88647 r9:84982400 r8:8529542c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851b8c00 r8:852953ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295380 r8:8027f5e8 r7:eac75e60 r6:85295480 r5:851b8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac7dfb0 to 0xeac7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8529f0c0 INFO: task kworker/1:327:4241 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 92fee000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 Exception stack(0xe05e1fb0 to 0xe05e1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829188dc r9:eac8dd84 r8:00000002 r7:60000113 r6:eac8dd8c r5:851b9800 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa05000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508f38c r4:8508f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8508f38c r4:85295500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851b9800 r8:8529552c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295500 r8:8027f5e8 r7:eac7de60 r6:85295580 r5:851b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac8dfb0 to 0xeac8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8529f280 INFO: task kworker/1:328:4243 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 92fee000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:329:4246 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:329 state:D stack:0 pid:4246 tgid:4246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac91d84 r8:00000002 r7:60000113 r6:eac91d8c r5:851ba400 r4:851ba400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ba400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529f7c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa4b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508ff8c r4:8508fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8508ff8c r4:85295600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ba400 r8:8529562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295600 r8:8027f5e8 r7:eac7de60 r6:85295680 r5:851ba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac91fb0 to 0xeac91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8529f6c0 INFO: task kworker/1:329:4246 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 932b5000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:330:4247 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:330 state:D stack:0 pid:4247 tgid:4247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac9dd84 r8:00000002 r7:60000113 r6:eac9dd8c r5:84983000 r4:84983000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84983000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac9de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525c380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84983000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0513000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504138c r4:85041000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8504138c r4:85295700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84983000 r8:8529572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295700 r8:8027f5e8 r7:eac91e60 r6:84b41580 r5:84983000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac9dfb0 to 0xeac9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8529f7c0 INFO: task kworker/1:330:4247 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 93734000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:331:4249 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:331 state:D stack:0 pid:4249 tgid:4249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaca5d84 r8:00000002 r7:60000113 r6:eaca5d8c r5:84983c00 r4:84983c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84983c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529f9c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84983c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa5f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508fb8c r4:8508f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8508fb8c r4:85295780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84983c00 r8:852957ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295780 r8:8027f5e8 r7:eac9de60 r6:84b41600 r5:84983c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca5fb0 to 0xeaca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8529f840 INFO: task kworker/1:331:4249 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 93734000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:332:4251 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:332 state:D stack:0 pid:4251 tgid:4251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacadd84 r8:00000002 r7:60000113 r6:eacadd8c r5:84980000 r4:84980000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84980000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacade08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529fb40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84980000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa6f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509838c r4:85098000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509838c r4:85295880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84980000 r8:852958ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295880 r8:8027f5e8 r7:eac9de60 r6:84b41680 r5:84980000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacadfb0 to 0xeacadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8529fa00 INFO: task kworker/1:332:4251 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9422a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:333:4253 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:333 state:D stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacb5d84 r8:00000002 r7:60000013 r6:eacb5d8c r5:84984800 r4:84984800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84984800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529fc40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84984800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa7f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509878c r4:85098400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509878c r4:85295900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84984800 r8:8529592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295900 r8:8027f5e8 r7:eac9de60 r6:84b41700 r5:84984800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb5fb0 to 0xeacb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8529fc00 INFO: task kworker/1:333:4253 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9422a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:334:4255 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:334 state:D stack:0 pid:4255 tgid:4255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacbdd84 r8:00000002 r7:60000013 r6:eacbdd8c r5:84986c00 r4:84986c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84986c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacbde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529fe40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84986c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa95000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85098b8c r4:85098800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85098b8c r4:85295800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84986c00 r8:8529582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295800 r8:8027f5e8 r7:eac9de60 r6:84b41780 r5:84986c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacbdfb0 to 0xeacbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8529fc80 INFO: task kworker/1:334:4255 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9422a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:335:4257 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:335 state:D stack:0 pid:4257 tgid:4257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacc5d84 r8:00000002 r7:60000113 r6:eacc5d8c r5:84986000 r4:84986000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84986000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529ff80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84986000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85098f8c r4:85098c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85098f8c r4:85295a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84986000 r8:85295a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295a00 r8:8027f5e8 r7:eac9de60 r6:84b41800 r5:84986000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc5fb0 to 0xeacc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8529f500 INFO: task kworker/1:335:4257 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 94806000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:336:4259 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:336 state:D stack:0 pid:4259 tgid:4259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaccdd84 r8:00000002 r7:60000013 r6:eaccdd8c r5:84980c00 r4:84980c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84980c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaccde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3f6c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84980c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509938c r4:85099000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509938c r4:85295a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84980c00 r8:85295aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295a80 r8:8027f5e8 r7:eac9de60 r6:84b41880 r5:84980c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaccdfb0 to 0xeaccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8529ffc0 INFO: task kworker/1:336:4259 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 94806000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:337:4261 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:337 state:D stack:0 pid:4261 tgid:4261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacd9d84 r8:00000002 r7:60000013 r6:eacd9d8c r5:84985400 r4:84985400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84985400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529fc80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84985400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaacf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509978c r4:85099400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509978c r4:85295980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84985400 r8:852959ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295980 r8:8027f5e8 r7:eac9de60 r6:84b41900 r5:84985400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd9fb0 to 0xeacd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8529ff40 INFO: task kworker/1:337:4261 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9564e000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:338:4263 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:338 state:D stack:0 pid:4263 tgid:4263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacddd84 r8:00000002 r7:60000113 r6:eacddd8c r5:84830000 r4:84830000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84830000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacdde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b44600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84830000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85099f8c r4:85099c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85099f8c r4:85295b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830000 r8:85295b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295b00 r8:8027f5e8 r7:eac9de60 r6:84b41980 r5:84830000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacddfb0 to 0xeacddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b44f00 INFO: task kworker/1:338:4263 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9564e000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:339:4265 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:339 state:D stack:0 pid:4265 tgid:4265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eace1d84 r8:00000002 r7:60000113 r6:eace1d8c r5:84830c00 r4:84830c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84830c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525c000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84830c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85099b8c r4:85099800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85099b8c r4:85295c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830c00 r8:85295c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295c00 r8:8027f5e8 r7:eac9de60 r6:84b41a00 r5:84830c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace1fb0 to 0xeace1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b3f940 INFO: task kworker/1:339:4265 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9564e000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:340:4267 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:340 state:D stack:0 pid:4267 tgid:4267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eace5d84 r8:00000002 r7:60000113 r6:eace5d8c r5:84831800 r4:84831800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84831800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525c3c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84831800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab03000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509a78c r4:8509a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509a78c r4:85295b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84831800 r8:85295bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295b80 r8:8027f5e8 r7:eac9de60 r6:84b41a80 r5:84831800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace5fb0 to 0xeace5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8525c2c0 INFO: task kworker/1:340:4267 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 95ebc000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:341:4269 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:341 state:D stack:0 pid:4269 tgid:4269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacedd84 r8:00000002 r7:60000013 r6:eacedd8c r5:84833000 r4:84833000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84833000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacede08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fb00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84833000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89ef000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d978c r4:852d9400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d978c r4:85295d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84833000 r8:85295d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295d00 r8:8027f5e8 r7:eac9de60 r6:84b41b00 r5:84833000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacedfb0 to 0xeacedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8525c1c0 INFO: task kworker/1:341:4269 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 96069000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:232:4273 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:232 state:D stack:0 pid:4273 tgid:4273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eace9d84 r8:00000002 r7:60000013 r6:eace9d8c r5:84833c00 r4:84833c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84833c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85258d00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84833c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8442a78c r4:8442a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8442a78c r4:84b41b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84833c00 r8:84b41bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41b80 r8:8027f5e8 r7:e4915e60 r6:84b41c80 r5:84833c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace9fb0 to 0xeace9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852588c0 INFO: task kworker/0:232:4273 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 96657000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:233:4275 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:233 state:D stack:0 pid:4275 tgid:4275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac79d84 r8:00000002 r7:60000013 r6:eac79d8c r5:84834800 r4:84834800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84834800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852593c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84834800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e057b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504178c r4:85041400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504178c r4:84b41c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84834800 r8:84b41c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41c00 r8:8027f5e8 r7:e4915e60 r6:84b41d80 r5:84834800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac79fb0 to 0xeac79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85258dc0 INFO: task kworker/0:233:4275 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 96657000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:234:4276 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:234 state:D stack:0 pid:4276 tgid:4276 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac99d84 r8:00000002 r7:60000113 r6:eac99d8c r5:84835400 r4:84835400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84835400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85258fc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84835400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0145000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504078c r4:85040400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504078c r4:84b41d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84835400 r8:84b41d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41d00 r8:8027f5e8 r7:eac79e60 r6:84b41e00 r5:84835400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac99fb0 to 0xeac99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85258b80 INFO: task kworker/0:234:4276 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 97207000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:235:4278 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:235 state:D stack:0 pid:4278 tgid:4278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab99d84 r8:00000002 r7:60000013 r6:eab99d8c r5:84836c00 r4:84836c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84836c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab99e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85258100 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84836c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e018b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85040b8c r4:85040800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85040b8c r4:84b41e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84836c00 r8:84b41eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b41e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b41e80 r8:8027f5e8 r7:eac79e60 r6:84b41f80 r5:84836c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab99fb0 to 0xeab99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85258f00 INFO: task kworker/0:235:4278 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 97207000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:236:4280 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:236 state:D stack:0 pid:4280 tgid:4280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eabb1d84 r8:00000002 r7:60000013 r6:eabb1d8c r5:84836000 r4:84836000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84836000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3fa80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84836000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85040f8c r4:85040c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85040f8c r4:8525a100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84836000 r8:8525a12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525a100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a100 r8:8027f5e8 r7:eac79e60 r6:8525a080 r5:84836000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb1fb0 to 0xeabb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85258180 INFO: task kworker/0:236:4280 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 97754000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:4282 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:4282 tgid:4282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eabbdd84 r8:00000002 r7:60000013 r6:eabbdd8c r5:8498ec00 r4:8498ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8498ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabbde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85259980 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8498ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e077d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85041b8c r4:85041800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85041b8c r4:8525a000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498ec00 r8:8525a02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525a000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a000 r8:8027f5e8 r7:eac79e60 r6:8525a200 r5:8498ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabbdfb0 to 0xeabbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b3f940 INFO: task kworker/0:237:4282 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 97d38000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:342:4284 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:342 state:D stack:0 pid:4284 tgid:4284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacf5d84 r8:00000002 r7:60000113 r6:eacf5d8c r5:8498e000 r4:8498e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8498e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525c780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8498e000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509ab8c r4:8509a800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509ab8c r4:85295c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8498e000 r8:85295cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295c80 r8:8027f5e8 r7:eacede60 r6:8525a280 r5:8498e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf5fb0 to 0xeacf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8525c100 INFO: task kworker/1:342:4284 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 981b0000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:238:4286 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:238 state:D stack:0 pid:4286 tgid:4286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacfdd84 r8:00000002 r7:60000113 r6:eacfdd8c r5:85270000 r4:85270000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85270000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacfde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85259e80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85270000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08ab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504278c r4:85042400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504278c r4:8525a380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85270000 r8:8525a3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525a380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a380 r8:8027f5e8 r7:eabbde60 r6:8525a180 r5:85270000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacfdfb0 to 0xeacfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85259440 INFO: task kworker/0:238:4286 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 98871000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:343:4288 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:343 state:D stack:0 pid:4288 tgid:4288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead01d84 r8:00000002 r7:60000113 r6:ead01d8c r5:85271800 r4:85271800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85271800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead01e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525c880 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85271800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0685000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509af8c r4:8509ac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509af8c r4:85295d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85271800 r8:85295dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295d80 r8:8027f5e8 r7:eacede60 r6:8525a400 r5:85271800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead01fb0 to 0xead01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8525c6c0 INFO: task kworker/1:343:4288 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 98871000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:344:4290 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:344 state:D stack:0 pid:4290 tgid:4290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead09d84 r8:00000002 r7:60000113 r6:ead09d8c r5:85273000 r4:85273000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85273000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead09e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad1b00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85273000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb07b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509b78c r4:8509b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509b78c r4:85295e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85273000 r8:85295e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85295e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85295e00 r8:8027f5e8 r7:eacede60 r6:8525a480 r5:85273000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead09fb0 to 0xead09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8525c8c0 INFO: task kworker/1:344:4290 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 98871000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:239:4292 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:239 state:D stack:0 pid:4292 tgid:4292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead0dd84 r8:00000002 r7:60000113 r6:ead0dd8c r5:85272400 r4:85272400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85272400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead0de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85259b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85272400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0819000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85041f8c r4:85041c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85041f8c r4:8525a500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85272400 r8:8525a52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525a500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a500 r8:8027f5e8 r7:eacfde60 r6:8525a600 r5:85272400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead0dfb0 to 0xead0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852596c0 INFO: task kworker/0:239:4292 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 98da1000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:240:4294 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:240 state:D stack:0 pid:4294 tgid:4294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead05d84 r8:00000002 r7:60000113 r6:ead05d8c r5:85273c00 r4:85273c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85273c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead05e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85259cc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85273c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0885000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504238c r4:85042000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504238c r4:8525a580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85273c00 r8:8525a5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525a580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a580 r8:8027f5e8 r7:eacfde60 r6:8525a700 r5:85273c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead05fb0 to 0xead05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852599c0 INFO: task kworker/0:240:4294 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 995fa000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:241:4296 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:241 state:D stack:0 pid:4296 tgid:4296 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab49d84 r8:00000002 r7:60000013 r6:eab49d8c r5:85274800 r4:85274800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85274800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab49e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85274800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e496d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504338c r4:85043000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504338c r4:8525a680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85274800 r8:8525a6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525a680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a680 r8:8027f5e8 r7:eacfde60 r6:8525a780 r5:85274800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab49fb0 to 0xeab49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85259700 INFO: task kworker/0:241:4296 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 995fa000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:242:4298 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:242 state:D stack:0 pid:4298 tgid:4298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead11d84 r8:00000002 r7:60000013 r6:ead11d8c r5:85276000 r4:85276000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85276000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead11e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85259240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85276000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4901000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85042b8c r4:85042800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85042b8c r4:8525a800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85276000 r8:8525a82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525a800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a800 r8:8027f5e8 r7:eab49e60 r6:8525a880 r5:85276000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead11fb0 to 0xead11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85259c00 INFO: task kworker/0:242:4298 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9a13c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:243:4300 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:243 state:D stack:0 pid:4300 tgid:4300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead15d84 r8:00000002 r7:60000113 r6:ead15d8c r5:85275400 r4:85275400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85275400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead15e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85275400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4931000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85042f8c r4:85042c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85042f8c r4:8525a900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85275400 r8:8525a92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525a900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a900 r8:8027f5e8 r7:eab49e60 r6:8525aa00 r5:85275400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead15fb0 to 0xead15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85259700 INFO: task kworker/0:243:4300 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9a13c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:244:4302 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:244 state:D stack:0 pid:4302 tgid:4302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead19d84 r8:00000002 r7:60000013 r6:ead19d8c r5:85276c00 r4:85276c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85276c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead19e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850627c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85276c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85043b8c r4:85043800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85043b8c r4:8525a980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85276c00 r8:8525a9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525a980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525a980 r8:8027f5e8 r7:eab49e60 r6:8525aa80 r5:85276c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead19fb0 to 0xead19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850622c0 INFO: task kworker/0:244:4302 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9a13c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:245:4304 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:245 state:D stack:0 pid:4304 tgid:4304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacb9d84 r8:00000002 r7:60000013 r6:eacb9d8c r5:85270c00 r4:85270c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85270c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850625c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85270c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa33000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504378c r4:85043400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504378c r4:8525ab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85270c00 r8:8525ab2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525ab00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525ab00 r8:8027f5e8 r7:ead19e60 r6:8525ab80 r5:85270c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb9fb0 to 0xeacb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85062340 INFO: task kworker/0:245:4304 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9a854000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:246:4306 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:246 state:D stack:0 pid:4306 tgid:4306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacc9d84 r8:00000002 r7:60000113 r6:eacc9d8c r5:85278c00 r4:85278c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85278c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85278c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd6b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505038c r4:85050000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505038c r4:8525ac00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85278c00 r8:8525ac2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525ac00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525ac00 r8:8027f5e8 r7:ead19e60 r6:8525ad00 r5:85278c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc9fb0 to 0xeacc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85062600 INFO: task kworker/0:246:4306 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9aceb000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:247:4308 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:247 state:D stack:0 pid:4308 tgid:4308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacd1d84 r8:00000002 r7:60000113 r6:eacd1d8c r5:85278000 r4:85278000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85278000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062cc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85278000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff53000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85050b8c r4:85050800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85050b8c r4:8525ac80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85278000 r8:8525acac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525ac80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525ac80 r8:8027f5e8 r7:eacc9e60 r6:8525ae00 r5:85278000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd1fb0 to 0xeacd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85062700 INFO: task kworker/0:247:4308 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9aceb000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:248:4310 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:248 state:D stack:0 pid:4310 tgid:4310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacf1d84 r8:00000002 r7:60000013 r6:eacf1d8c r5:8527a400 r4:8527a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8527a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8527a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe39000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505078c r4:85050400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505078c r4:8525af80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527a400 r8:8525afac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525af80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525af80 r8:8027f5e8 r7:eacd1e60 r6:8525a300 r5:8527a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf1fb0 to 0xeacf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85062900 INFO: task kworker/0:248:4310 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9b298000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:249:4313 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:249 state:D stack:0 pid:4313 tgid:4313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead1dd84 r8:00000002 r7:60000113 r6:ead1dd8c r5:8527b000 r4:8527b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8527b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062ec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8527b000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505138c r4:85051000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505138c r4:8525ad80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527b000 r8:8525adac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525ad80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525ad80 r8:8027f5e8 r7:eacd1e60 r6:8525af00 r5:8527b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead1dfb0 to 0xead1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85062800 INFO: task kworker/0:249:4313 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9b298000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:250:4314 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:250 state:D stack:0 pid:4314 tgid:4314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead21d84 r8:00000002 r7:60000113 r6:ead21d8c r5:8527bc00 r4:8527bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8527bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead21e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062e80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8527bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0603000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505178c r4:85051400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505178c r4:8525ae80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527bc00 r8:8525aeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8525ae80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8525ae80 r8:8027f5e8 r7:ead1de60 r6:84b41f00 r5:8527bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead21fb0 to 0xead21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85062d00 INFO: task kworker/0:250:4314 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9b298000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:251:4317 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:251 state:D stack:0 pid:4317 tgid:4317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead25d84 r8:00000002 r7:60000013 r6:ead25d8c r5:8527c800 r4:8527c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8527c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead25e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062fc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8527c800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05d5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85050f8c r4:85050c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85050f8c r4:85061000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527c800 r8:8506102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061000 r8:8027f5e8 r7:ead21e60 r6:85061080 r5:8527c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead25fb0 to 0xead25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85062900 INFO: task kworker/0:251:4317 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9bd8c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:252:4319 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:252 state:D stack:0 pid:4319 tgid:4319 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead2dd84 r8:00000002 r7:60000113 r6:ead2dd8c r5:8527d400 r4:8527d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8527d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead2de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252100 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8527d400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85051b8c r4:85051800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85051b8c r4:85061100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527d400 r8:8506112c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061100 r8:8027f5e8 r7:ead21e60 r6:85061200 r5:8527d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead2dfb0 to 0xead2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85259dc0 INFO: task kworker/0:252:4319 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9bd8c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:4320 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:4320 tgid:4320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead29d84 r8:00000002 r7:60000113 r6:ead29d8c r5:8527e000 r4:8527e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8527e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead29e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8527e000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0709000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505238c r4:85052000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505238c r4:85061180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527e000 r8:850611ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061180 r8:8027f5e8 r7:ead2de60 r6:85061280 r5:8527e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead29fb0 to 0xead29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85259dc0 INFO: task kworker/0:253:4320 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9c3b8000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:254:4323 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:254 state:D stack:0 pid:4323 tgid:4323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead31d84 r8:00000002 r7:60000113 r6:ead31d8c r5:8527ec00 r4:8527ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8527ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead31e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8527ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06c3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85051f8c r4:85051c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85051f8c r4:85061300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527ec00 r8:8506132c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061300 r8:8027f5e8 r7:ead29e60 r6:85061380 r5:8527ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead31fb0 to 0xead31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85252040 INFO: task kworker/0:254:4323 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9c3b8000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:4325 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:4325 tgid:4325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead39d84 r8:00000002 r7:60000013 r6:ead39d8c r5:85279800 r4:85279800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85279800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead39e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85279800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e080d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85052b8c r4:85052800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85052b8c r4:85061400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85279800 r8:8506142c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061400 r8:8027f5e8 r7:ead29e60 r6:85061500 r5:85279800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead39fb0 to 0xead39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85252480 INFO: task kworker/0:255:4325 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9ca3a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:256:4326 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:256 state:D stack:0 pid:4326 tgid:4326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead3dd84 r8:00000002 r7:60000113 r6:ead3dd8c r5:84832400 r4:84832400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84832400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead3de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84832400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0765000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505278c r4:85052400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505278c r4:85061480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84832400 r8:850614ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061480 r8:8027f5e8 r7:ead39e60 r6:85061600 r5:84832400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead3dfb0 to 0xead3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85252540 INFO: task kworker/0:256:4326 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9d28d000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:257:4329 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:257 state:D stack:0 pid:4329 tgid:4329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead41d84 r8:00000002 r7:60000113 r6:ead41d8c r5:84880000 r4:84880000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84880000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead41e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252b00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84880000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89b7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85053b8c r4:85053800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85053b8c r4:85061580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84880000 r8:850615ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061580 r8:8027f5e8 r7:ead39e60 r6:85061700 r5:84880000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead41fb0 to 0xead41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852523c0 INFO: task kworker/0:257:4329 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9da2c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:258:4330 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:258 state:D stack:0 pid:4330 tgid:4330 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead35d84 r8:00000002 r7:60000013 r6:ead35d8c r5:84880c00 r4:84880c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84880c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead35e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852529c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84880c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0843000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505338c r4:85053000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505338c r4:85061680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84880c00 r8:850616ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061680 r8:8027f5e8 r7:ead41e60 r6:85061800 r5:84880c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead35fb0 to 0xead35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85252740 INFO: task kworker/0:258:4330 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9da2c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:259:4331 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:259 state:D stack:0 pid:4331 tgid:4331 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead49d84 r8:00000002 r7:60000113 r6:ead49d8c r5:84882400 r4:84882400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84882400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead49e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252bc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84882400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89a3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85052f8c r4:85052c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85052f8c r4:85061780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84882400 r8:850617ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061780 r8:8027f5e8 r7:ead41e60 r6:85061880 r5:84882400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead49fb0 to 0xead49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85252900 INFO: task kworker/0:259:4331 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9e19a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:260:4334 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:4334 tgid:4334 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead51d84 r8:00000002 r7:60000113 r6:ead51d8c r5:851bec00 r4:851bec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851bec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead51e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85259c80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa17000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505c38c r4:8505c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505c38c r4:85061900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bec00 r8:8506192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061900 r8:8027f5e8 r7:ead41e60 r6:85295e80 r5:851bec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead51fb0 to 0xead51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85252c00 INFO: task kworker/0:260:4334 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9e25a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:261:4336 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:261 state:D stack:0 pid:4336 tgid:4336 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead59d84 r8:00000002 r7:60000113 r6:ead59d8c r5:851bc800 r4:851bc800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851bc800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead59e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252e00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89c7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85053f8c r4:85053c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85053f8c r4:85061a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bc800 r8:85061a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061a00 r8:8027f5e8 r7:ead51e60 r6:85295f00 r5:851bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead59fb0 to 0xead59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85252b80 INFO: task kworker/0:261:4336 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9e67d000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:262:4338 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:262 state:D stack:0 pid:4338 tgid:4338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead61d84 r8:00000002 r7:60000013 r6:ead61d8c r5:851bd400 r4:851bd400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851bd400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead61e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252f40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89e7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505378c r4:85053400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505378c r4:85061a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bd400 r8:85061aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061a80 r8:8027f5e8 r7:ead51e60 r6:85295f80 r5:851bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead61fb0 to 0xead61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85252b80 INFO: task kworker/0:262:4338 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9e6d4000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:263:4340 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:263 state:D stack:0 pid:4340 tgid:4340 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead69d84 r8:00000002 r7:60000113 r6:ead69d8c r5:851be000 r4:851be000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851be000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead69e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525ca40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851be000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85043f8c r4:85043c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85043f8c r4:85061b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851be000 r8:85061b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061b00 r8:8027f5e8 r7:ead51e60 r6:85296000 r5:851be000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead69fb0 to 0xead69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85252a00 INFO: task kworker/0:263:4340 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9e6d4000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:264:4342 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:264 state:D stack:0 pid:4342 tgid:4342 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead71d84 r8:00000002 r7:60000113 r6:ead71d8c r5:851bb000 r4:851bb000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851bb000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead71e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85298040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa4d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505c78c r4:8505c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505c78c r4:85061b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bb000 r8:85061bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061b80 r8:8027f5e8 r7:ead51e60 r6:85296080 r5:851bb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead71fb0 to 0xead71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85252fc0 INFO: task kworker/0:264:4342 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9eaeb000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:265:4344 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:265 state:D stack:0 pid:4344 tgid:4344 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead79d84 r8:00000002 r7:60000013 r6:ead79d8c r5:85268c00 r4:85268c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85268c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead79e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85298440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85268c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa79000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505cf8c r4:8505cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505cf8c r4:85061c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85268c00 r8:85061c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061c00 r8:8027f5e8 r7:ead71e60 r6:85296100 r5:85268c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead79fb0 to 0xead79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85252640 INFO: task kworker/0:265:4344 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9eccb000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:266:4346 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:266 state:D stack:0 pid:4346 tgid:4346 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead81d84 r8:00000002 r7:60000113 r6:ead81d8c r5:85268000 r4:85268000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85268000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead81e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852982c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85268000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa67000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505cb8c r4:8505c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505cb8c r4:85061c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85268000 r8:85061cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061c80 r8:8027f5e8 r7:ead79e60 r6:85296180 r5:85268000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead81fb0 to 0xead81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85298100 INFO: task kworker/0:266:4346 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9eec7000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 INFO: task kworker/0:267:4348 blocked for more than 457 seconds. r5:85269800 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaaf3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505df8c r4:8505dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505df8c r4:85061d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85269800 r8:85061d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061d00 r8:8027f5e8 r7:ead79e60 r6:85296200 r5:85269800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead89fb0 to 0xead89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85298300 INFO: task kworker/0:267:4348 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead91d84 r8:00000002 r7:60000113 r6:ead91d8c r5:8526bc00 r4:8526bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8526bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead91e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85298580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8526bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa9b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505d38c r4:8505d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505d38c r4:85061980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526bc00 r8:850619ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061980 r8:8027f5e8 r7:ead89e60 r6:85296280 r5:8526bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r5:85c3938c r4:85c39000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:269:4352 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:269 state:D stack:0 pid:4352 tgid:4352 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead99d84 r8:00000002 r7:60000113 r6:ead99d8c r5:8526c800 r4:8526c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8526c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead99e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85298640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8526c800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505d78c r4:8505d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505d78c r4:85061e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526c800 r8:85061e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061e00 r8:8027f5e8 r7:ead89e60 r6:85296300 r5:8526c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead99fb0 to 0xead99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85298300 INFO: task kworker/0:269:4352 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:00000000 r5:00001000 r4:eced5000 r5:85c3938c r4:85c39000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:270:4354 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:270 state:D stack:0 pid:4354 tgid:4354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eada1d84 r8:00000002 r7:60000113 r6:eada1d8c r5:8526a400 r4:8526a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8526a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85298800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8526a400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505db8c r4:8505d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505db8c r4:85061d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526a400 r8:85061dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061d80 r8:8027f5e8 r7:ead89e60 r6:85296380 r5:8526a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada1fb0 to 0xeada1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85298680 INFO: task kworker/0:270:4354 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9f873000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r5:85c3938c r4:85c39000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:271:4356 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:271 state:D stack:0 pid:4356 tgid:4356 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eada9d84 r8:00000002 r7:60000013 r6:eada9d8c r5:8526b000 r4:8526b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8526b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85298980 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8526b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaadd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505e38c r4:8505e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505e38c r4:85061e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526b000 r8:85061eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85061e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85061e80 r8:8027f5e8 r7:ead89e60 r6:85296400 r5:8526b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada9fb0 to 0xeada9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85298900 INFO: task kworker/0:271:4356 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9fbe1000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:272:4359 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:272 state:D stack:0 pid:4359 tgid:4359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eadb5d84 r8:00000002 r7:60000113 r6:eadb5d8c r5:8526d400 r4:8526d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8526d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85252640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8526d400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab33000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505f78c r4:8505f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505f78c r4:84b3c100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526d400 r8:84b3c12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3c100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3c100 r8:8027f5e8 r7:ead89e60 r6:85296480 r5:8526d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb5fb0 to 0xeadb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85298740 INFO: task kworker/0:272:4359 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9fe03000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:273:4360 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:273 state:D stack:0 pid:4360 tgid:4360 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eadb9d84 r8:00000002 r7:60000013 r6:eadb9d8c r5:8526e000 r4:8526e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8526e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85298bc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8526e000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab07000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505e78c r4:8505e400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505e78c r4:84b3c080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526e000 r8:84b3c0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3c080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3c080 r8:8027f5e8 r7:eadb5e60 r6:85296500 r5:8526e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb9fb0 to 0xeadb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85298740 INFO: task kworker/0:273:4360 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: 9ffa7000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:274:4363 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:274 state:D stack:0 pid:4363 tgid:4363 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eadc5d84 r8:00000002 r7:60000113 r6:eadc5d8c r5:851c0c00 r4:851c0c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c0c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85298d00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab11000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505eb8c r4:8505e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505eb8c r4:84b3c180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c0c00 r8:84b3c1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3c180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3c180 r8:8027f5e8 r7:eadb5e60 r6:85296580 r5:851c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc5fb0 to 0xeadc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852989c0 INFO: task kworker/0:274:4363 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a01b5000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:275:4365 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:275 state:D stack:0 pid:4365 tgid:4365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eadcdd84 r8:00000002 r7:60000113 r6:eadcdd8c r5:851c2400 r4:851c2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c2400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadcde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85298f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab23000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505f38c r4:8505f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505f38c r4:84b3c200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c2400 r8:84b3c22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3c200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3c200 r8:8027f5e8 r7:eadb5e60 r6:85296600 r5:851c2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadcdfb0 to 0xeadcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85298d40 INFO: task kworker/0:275:4365 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a048a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:276:4367 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:276 state:D stack:0 pid:4367 tgid:4367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eadd5d84 r8:00000002 r7:60000113 r6:eadd5d8c r5:851c0000 r4:851c0000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b29800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518cf8c r4:8518cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8518cf8c r4:84b3c280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c0000 r8:84b3c2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3c280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3c280 r8:8027f5e8 r7:eadb5e60 r6:85296680 r5:851c0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd5fb0 to 0xeadd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85298f40 INFO: task kworker/0:276:4367 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a0642000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:277:4368 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:277 state:D stack:0 pid:4368 tgid:4368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eadd9d84 r8:00000002 r7:60000113 r6:eadd9d8c r5:851c1800 r4:851c1800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c1800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85298ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab4d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505ef8c r4:8505ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505ef8c r4:84b3c300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c1800 r8:84b3c32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3c300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3c300 r8:8027f5e8 r7:eadd5e60 r6:85296700 r5:851c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd9fb0 to 0xeadd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85298f80 INFO: task kworker/0:277:4368 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a0642000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:278:4370 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:278 state:D stack:0 pid:4370 tgid:4370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eade1d84 r8:00000002 r7:60000113 r6:eade1d8c r5:851c4800 r4:851c4800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c4800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b29140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505ff8c r4:8505fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505ff8c r4:84b3c000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c4800 r8:84b3c02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3c000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3c000 r8:8027f5e8 r7:eadd5e60 r6:85296780 r5:851c4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade1fb0 to 0xeade1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85298fc0 INFO: task kworker/0:278:4370 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a084c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:279:4372 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:279 state:D stack:0 pid:4372 tgid:4372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eade9d84 r8:00000002 r7:60000113 r6:eade9d8c r5:851c3c00 r4:851c3c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c3c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b29340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505fb8c r4:8505f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8505fb8c r4:84b3c480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c3c00 r8:84b3c4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3c480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3c480 r8:8027f5e8 r7:eadd5e60 r6:85296800 r5:851c3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade9fb0 to 0xeade9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b29180 INFO: task kworker/0:279:4372 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a0b5b000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:280:4374 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:280 state:D stack:0 pid:4374 tgid:4374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eadf1d84 r8:00000002 r7:60000013 r6:eadf1d8c r5:851c3000 r4:851c3000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c3000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b29440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518c38c r4:8518c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8518c38c r4:84b3c500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c3000 r8:84b3c52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3c500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3c500 r8:8027f5e8 r7:eadd5e60 r6:85296880 r5:851c3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf1fb0 to 0xeadf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b29380 INFO: task kworker/0:280:4374 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a0ccc000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:281:4376 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:281 state:D stack:0 pid:4376 tgid:4376 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead45d84 r8:00000002 r7:60000113 r6:ead45d8c r5:84883000 r4:84883000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84883000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead45e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b29600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84883000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabe7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518c78c r4:8518c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8518c78c r4:84b3c380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84883000 r8:84b3c3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3c380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3c380 r8:8027f5e8 r7:eadd5e60 r6:84b3c400 r5:84883000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead45fb0 to 0xead45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b29480 INFO: task kworker/0:281:4376 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a1050000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:282:4380 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:282 state:D stack:0 pid:4380 tgid:4380 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eadf9d84 r8:00000002 r7:60000113 r6:eadf9d8c r5:84883c00 r4:84883c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84883c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b29a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84883c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518d38c r4:8518d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8518d38c r4:84b3c580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84883c00 r8:84b3c5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3c580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3c580 r8:8027f5e8 r7:eadd5e60 r6:84b3c600 r5:84883c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf9fb0 to 0xeadf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b29740 INFO: task kworker/0:282:4380 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a12b0000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:283:4381 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:283 state:D stack:0 pid:4381 tgid:4381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead4dd84 r8:00000002 r7:60000113 r6:ead4dd8c r5:84884800 r4:84884800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84884800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead4de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b29880 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84884800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac09000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518cb8c r4:8518c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8518cb8c r4:84b3c680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84884800 r8:84b3c6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3c680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3c680 r8:8027f5e8 r7:eadf9e60 r6:84b3c700 r5:84884800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead4dfb0 to 0xead4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b29740 INFO: task kworker/0:283:4381 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a1585000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:284:4383 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:284 state:D stack:0 pid:4383 tgid:4383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eadfdd84 r8:00000002 r7:60000113 r6:eadfdd8c r5:84885400 r4:84885400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84885400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b29ec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84885400 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc03000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518df8c r4:8518dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8518df8c r4:84b3c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84885400 r8:84b3c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3c780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3c780 r8:8027f5e8 r7:eadf9e60 r6:84b3c880 r5:84885400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadfdfb0 to 0xeadfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b29480 INFO: task kworker/0:284:4383 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a1832000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:285:4385 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:285 state:D stack:0 pid:4385 tgid:4385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae05d84 r8:00000002 r7:60000113 r6:eae05d8c r5:84886000 r4:84886000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84886000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae05e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b29c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84886000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac2b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518d78c r4:8518d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8518d78c r4:84b3c800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84886000 r8:84b3c82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3c800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3c800 r8:8027f5e8 r7:eadfde60 r6:84b3c980 r5:84886000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae05fb0 to 0xeae05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b29640 INFO: task kworker/0:285:4385 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a1abc000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:286:4386 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:286 state:D stack:0 pid:4386 tgid:4386 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae01d84 r8:00000002 r7:60000013 r6:eae01d8c r5:84886c00 r4:84886c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84886c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae01e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b29d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84886c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518db8c r4:8518d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8518db8c r4:84b3c900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84886c00 r8:84b3c92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3c900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3c900 r8:8027f5e8 r7:eadfde60 r6:84b3ca00 r5:84886c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae01fb0 to 0xeae01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b29640 INFO: task kworker/0:286:4386 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a1c3e000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:287:4388 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:287 state:D stack:0 pid:4388 tgid:4388 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae09d84 r8:00000002 r7:60000113 r6:eae09d8c r5:84881800 r4:84881800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84881800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae09e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84881800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0539000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518ef8c r4:8518ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8518ef8c r4:84b3ca80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84881800 r8:84b3caac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3ca80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3ca80 r8:8027f5e8 r7:eadfde60 r6:84b3cb80 r5:84881800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae09fb0 to 0xeae09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b29c80 INFO: task kworker/0:287:4388 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a1e7a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:288:4391 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:288 state:D stack:0 pid:4391 tgid:4391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e4941d84 r8:00000002 r7:60000113 r6:e4941d8c r5:84768000 r4:84768000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84768000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4941e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85298f40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84768000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00bb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518e38c r4:8518e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8518e38c r4:84b3cb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84768000 r8:84b3cb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3cb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3cb00 r8:8027f5e8 r7:eae09e60 r6:84b3cc00 r5:84768000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4941fb0 to 0xe4941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b29fc0 INFO: task kworker/0:288:4391 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a224d000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:289:4392 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:289 state:D stack:0 pid:4392 tgid:4392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacf9d84 r8:00000002 r7:60000113 r6:eacf9d8c r5:84768c00 r4:84768c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84768c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84768c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e013b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518e78c r4:8518e400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8518e78c r4:84b3cc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84768c00 r8:84b3ccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3cc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3cc80 r8:8027f5e8 r7:eae09e60 r6:84b3cd00 r5:84768c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf9fb0 to 0xeacf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b29e00 INFO: task kworker/0:289:4392 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a26de000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:290:4394 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:290 state:D stack:0 pid:4394 tgid:4394 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb659d84 r8:00000002 r7:60000113 r6:eb659d8c r5:84769800 r4:84769800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84769800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb659e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847812c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84769800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e019d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518eb8c r4:8518e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8518eb8c r4:84b3cd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84769800 r8:84b3cdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3cd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3cd80 r8:8027f5e8 r7:eae09e60 r6:84b3ce80 r5:84769800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb659fb0 to 0xeb659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84781100 INFO: task kworker/0:290:4394 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a26de000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:291:4396 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:291 state:D stack:0 pid:4396 tgid:4396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae0dd84 r8:00000002 r7:60000013 r6:eae0dd8c r5:8476a400 r4:8476a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8476a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae0de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8476a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518f38c r4:8518f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8518f38c r4:84b3ce00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476a400 r8:84b3ce2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3ce00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3ce00 r8:8027f5e8 r7:eae09e60 r6:84b3cf80 r5:8476a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae0dfb0 to 0xeae0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84781300 INFO: task kworker/0:291:4396 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a2917000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:292:4398 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:292 state:D stack:0 pid:4398 tgid:4398 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae11d84 r8:00000002 r7:60000113 r6:eae11d8c r5:8476b000 r4:8476b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8476b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae11e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847818c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8476b000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07df000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518fb8c r4:8518f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8518fb8c r4:84b3cf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476b000 r8:84b3cf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b3cf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b3cf00 r8:8027f5e8 r7:eae09e60 r6:84264e00 r5:8476b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae11fb0 to 0xeae11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84781380 INFO: task kworker/0:292:4398 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a2a38000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:293:4400 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:293 state:D stack:0 pid:4400 tgid:4400 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae15d84 r8:00000002 r7:60000113 r6:eae15d8c r5:8476bc00 r4:8476bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8476bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae15e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8476bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e070d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518f78c r4:8518f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8518f78c r4:84264d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476bc00 r8:84264dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84264d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84264d80 r8:8027f5e8 r7:eae11e60 r6:85061f80 r5:8476bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae15fb0 to 0xeae15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84781380 INFO: task kworker/0:293:4400 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a2cf0000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:294:4403 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:294 state:D stack:0 pid:4403 tgid:4403 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae19d84 r8:00000002 r7:60000113 r6:eae19d8c r5:8476c800 r4:8476c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8476c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae19e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781e40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8476c800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4979000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85198b8c r4:85198800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85198b8c r4:84816100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476c800 r8:8481612c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816100 r8:8027f5e8 r7:eae11e60 r6:84816080 r5:8476c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae19fb0 to 0xeae19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84781680 INFO: task kworker/0:294:4403 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a2e5c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:295:4405 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:295 state:D stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae1dd84 r8:00000002 r7:60000013 r6:eae1dd8c r5:8476d400 r4:8476d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8476d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8476d400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e089b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518ff8c r4:8518fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8518ff8c r4:84816000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476d400 r8:8481602c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816000 r8:8027f5e8 r7:eae19e60 r6:84816200 r5:8476d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae1dfb0 to 0xeae1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84781800 INFO: task kworker/0:295:4405 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a30cd000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:296:4408 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:296 state:D stack:0 pid:4408 tgid:4408 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae21d84 r8:00000002 r7:60000013 r6:eae21d8c r5:8476e000 r4:8476e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8476e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae21e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8476e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08bf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519838c r4:85198000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8519838c r4:84816180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476e000 r8:848161ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816180 r8:8027f5e8 r7:eae19e60 r6:84816280 r5:8476e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae21fb0 to 0xeae21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84781980 INFO: task kworker/0:296:4408 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a335b000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:297:4410 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:297 state:D stack:0 pid:4410 tgid:4410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae29d84 r8:00000002 r7:60000113 r6:eae29d8c r5:8476ec00 r4:8476ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8476ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae29e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781d80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8476ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4929000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519878c r4:85198400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8519878c r4:84816300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8476ec00 r8:8481632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816300 r8:8027f5e8 r7:eae19e60 r6:84816400 r5:8476ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae29fb0 to 0xeae29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84781b40 INFO: task kworker/0:297:4410 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a34f4000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:4411 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:4411 tgid:4411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae25d84 r8:00000002 r7:60000013 r6:eae25d8c r5:85208000 r4:85208000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85208000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae25e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849349c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85208000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae57000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519a78c r4:8519a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8519a78c r4:84816380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85208000 r8:848163ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816380 r8:8027f5e8 r7:eae19e60 r6:84816500 r5:85208000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae25fb0 to 0xeae25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84781e00 INFO: task kworker/0:298:4411 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a3766000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:299:4414 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:299 state:D stack:0 pid:4414 tgid:4414 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae2dd84 r8:00000002 r7:60000113 r6:eae2dd8c r5:85208c00 r4:85208c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85208c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae2de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8443a740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85208c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac3f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85198f8c r4:85198c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85198f8c r4:84816480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85208c00 r8:848164ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816480 r8:8027f5e8 r7:eae25e60 r6:84816600 r5:85208c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae2dfb0 to 0xeae2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84781fc0 INFO: task kworker/0:299:4414 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a3933000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:300:4415 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:300 state:D stack:0 pid:4415 tgid:4415 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae31d84 r8:00000002 r7:60000113 r6:eae31d8c r5:85209800 r4:85209800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85209800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae31e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849341c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85209800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac7f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519978c r4:85199400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8519978c r4:84816680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85209800 r8:848166ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816680 r8:8027f5e8 r7:eae25e60 r6:84816580 r5:85209800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae31fb0 to 0xeae31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84934100 INFO: task kworker/0:300:4415 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a3bb7000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:301:4418 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:301 state:D stack:0 pid:4418 tgid:4418 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae35d84 r8:00000002 r7:60000113 r6:eae35d8c r5:8520a400 r4:8520a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8520a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae35e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84934380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520a400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac9f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519938c r4:85199000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8519938c r4:84816800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520a400 r8:8481682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816800 r8:8027f5e8 r7:eae25e60 r6:84816780 r5:8520a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae35fb0 to 0xeae35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84934040 INFO: task kworker/0:301:4418 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a3efa000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:302:4420 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:302 state:D stack:0 pid:4420 tgid:4420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae3dd84 r8:00000002 r7:60000113 r6:eae3dd8c r5:8520b000 r4:8520b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8520b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae3de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84934200 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacaf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85199b8c r4:85199800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85199b8c r4:84816700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520b000 r8:8481672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816700 r8:8027f5e8 r7:eae25e60 r6:84816900 r5:8520b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae3dfb0 to 0xeae3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84934480 INFO: task kworker/0:302:4420 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a40ea000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:303:4421 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:303 state:D stack:0 pid:4421 tgid:4421 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae39d84 r8:00000002 r7:60000113 r6:eae39d8c r5:8520bc00 r4:8520bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8520bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae39e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84934680 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85199f8c r4:85199c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85199f8c r4:84816880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520bc00 r8:848168ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816880 r8:8027f5e8 r7:eae25e60 r6:84816980 r5:8520bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae39fb0 to 0xeae39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84934480 INFO: task kworker/0:303:4421 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a40ea000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:304:4424 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:304 state:D stack:0 pid:4424 tgid:4424 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae49d84 r8:00000002 r7:60000113 r6:eae49d8c r5:8520d400 r4:8520d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8520d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae49e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84934840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520d400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae4b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519a38c r4:8519a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8519a38c r4:84816a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520d400 r8:84816a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816a00 r8:8027f5e8 r7:eae25e60 r6:84816a80 r5:8520d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae49fb0 to 0xeae49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84934780 INFO: task kworker/0:304:4424 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a430a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:4425 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:4425 tgid:4425 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae55d84 r8:00000002 r7:60000113 r6:eae55d8c r5:851c5400 r4:851c5400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c5400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae55e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c1080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a038c r4:852a0000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a038c r4:84816b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c5400 r8:84816b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816b00 r8:8027f5e8 r7:eae25e60 r6:85296900 r5:851c5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae55fb0 to 0xeae55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84934780 INFO: task kworker/0:305:4425 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a459a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:306:4427 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:306 state:D stack:0 pid:4427 tgid:4427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae61d84 r8:00000002 r7:60000113 r6:eae61d8c r5:851c6000 r4:851c6000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c6000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae61e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84934b00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae63000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519ab8c r4:8519a800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8519ab8c r4:84816b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c6000 r8:84816bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816b80 r8:8027f5e8 r7:eae55e60 r6:85296a00 r5:851c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae61fb0 to 0xeae61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84934980 INFO: task kworker/0:306:4427 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a4828000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:307:4429 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:307 state:D stack:0 pid:4429 tgid:4429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae6dd84 r8:00000002 r7:60000113 r6:eae6dd8c r5:851c6c00 r4:851c6c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c6c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae6de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849348c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae6f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519b38c r4:8519b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8519b38c r4:84816c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c6c00 r8:84816cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816c80 r8:8027f5e8 r7:eae55e60 r6:85296980 r5:851c6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae6dfb0 to 0xeae6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84934a00 INFO: task kworker/0:307:4429 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a4b5e000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:308:4432 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:308 state:D stack:0 pid:4432 tgid:4432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae8dd84 r8:00000002 r7:60000113 r6:eae8dd8c r5:8526ec00 r4:8526ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8526ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae8de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84934d00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8526ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae77000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519af8c r4:8519ac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8519af8c r4:84816d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526ec00 r8:84816d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816d00 r8:8027f5e8 r7:eae55e60 r6:85296a80 r5:8526ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae8dfb0 to 0xeae8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84934d80 INFO: task kworker/0:308:4432 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a4ff2000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:309:4434 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:309 state:D stack:0 pid:4434 tgid:4434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaea1d84 r8:00000002 r7:60000013 r6:eaea1d8c r5:851c8000 r4:851c8000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c8000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84934a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae89000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519bb8c r4:8519b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8519bb8c r4:84816c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c8000 r8:84816c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816c00 r8:8027f5e8 r7:eae55e60 r6:85296b00 r5:851c8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea1fb0 to 0xeaea1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84934ac0 INFO: task kworker/0:309:4434 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a5350000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:4435 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:4435 tgid:4435 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae41d84 r8:00000002 r7:60000013 r6:eae41d8c r5:8520e000 r4:8520e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8520e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae41e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781fc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae99000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519bf8c r4:8519bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8519bf8c r4:84816e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520e000 r8:84816e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816e00 r8:8027f5e8 r7:eae55e60 r6:84816e80 r5:8520e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae41fb0 to 0xeae41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84781a80 INFO: task kworker/0:310:4435 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a5350000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:311:4437 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:311 state:D stack:0 pid:4437 tgid:4437 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae95d84 r8:00000002 r7:60000113 r6:eae95d8c r5:8520ec00 r4:8520ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8520ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae95e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c12c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a078c r4:852a0400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a078c r4:84816d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520ec00 r8:84816dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84816d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84816d80 r8:8027f5e8 r7:eae55e60 r6:84816f00 r5:8520ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae95fb0 to 0xeae95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84934f40 INFO: task kworker/0:311:4437 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a5952000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:312:4440 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:312 state:D stack:0 pid:4440 tgid:4440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaea5d84 r8:00000002 r7:60000113 r6:eaea5d8c r5:8520c800 r4:8520c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8520c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c1500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520c800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df8ff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a0f8c r4:852a0c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a0f8c r4:846ce100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520c800 r8:846ce12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846ce100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ce100 r8:8027f5e8 r7:eae95e60 r6:846ce080 r5:8520c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea5fb0 to 0xeaea5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c1200 INFO: task kworker/0:312:4440 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a5c46000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:313:4441 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:313 state:D stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaeb1d84 r8:00000002 r7:60000113 r6:eaeb1d8c r5:84750000 r4:84750000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84750000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c1740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84750000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a178c r4:852a1400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a178c r4:846ce000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84750000 r8:846ce02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846ce000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ce000 r8:8027f5e8 r7:eaea5e60 r6:846ce180 r5:84750000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb1fb0 to 0xeaeb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c1200 INFO: task kworker/0:313:4441 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a5ede000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:4444 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:4444 tgid:4444 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaebdd84 r8:00000002 r7:60000113 r6:eaebdd8c r5:84750c00 r4:84750c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84750c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaebde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c1580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84750c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a0b8c r4:852a0800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a0b8c r4:846ce200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84750c00 r8:846ce22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846ce200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ce200 r8:8027f5e8 r7:eaeb1e60 r6:846ce280 r5:84750c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaebdfb0 to 0xeaebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c1600 INFO: task kworker/0:314:4444 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a62a3000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:315:4445 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:315 state:D stack:0 pid:4445 tgid:4445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead5dd84 r8:00000002 r7:60000113 r6:ead5dd8c r5:84751800 r4:84751800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84751800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead5de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c1380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84751800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdb9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a138c r4:852a1000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a138c r4:846ce300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84751800 r8:846ce32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846ce300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ce300 r8:8027f5e8 r7:eaeb1e60 r6:846ce400 r5:84751800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead5dfb0 to 0xead5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c1200 INFO: task kworker/0:315:4445 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a6513000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:316:4448 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:316 state:D stack:0 pid:4448 tgid:4448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead7dd84 r8:00000002 r7:60000113 r6:ead7dd8c r5:84752400 r4:84752400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84752400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead7de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c1b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84752400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05e7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a1f8c r4:852a1c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a1f8c r4:846ce380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84752400 r8:846ce3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846ce380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ce380 r8:8027f5e8 r7:eaeb1e60 r6:846ce500 r5:84752400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead7dfb0 to 0xead7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c1800 INFO: task kworker/0:316:4448 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a65fd000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:317:4449 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:317 state:D stack:0 pid:4449 tgid:4449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eada5d84 r8:00000002 r7:60000113 r6:eada5d8c r5:851c9800 r4:851c9800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c9800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c1a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff8b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a1b8c r4:852a1800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a1b8c r4:846ce480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c9800 r8:846ce4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846ce480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ce480 r8:8027f5e8 r7:ead7de60 r6:85296b80 r5:851c9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada5fb0 to 0xeada5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c1540 INFO: task kworker/0:317:4449 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a680a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:318:4451 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:318 state:D stack:0 pid:4451 tgid:4451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eadbdd84 r8:00000002 r7:60000113 r6:eadbdd8c r5:851ca400 r4:851ca400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ca400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84811d80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0835000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a2b8c r4:852a2800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a2b8c r4:846ce580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ca400 r8:846ce5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846ce580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ce580 r8:8027f5e8 r7:ead7de60 r6:85296c00 r5:851ca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadbdfb0 to 0xeadbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c1900 INFO: task kworker/0:318:4451 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a6a3a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:319:4453 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:319 state:D stack:0 pid:4453 tgid:4453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaec9d84 r8:00000002 r7:60000013 r6:eaec9d8c r5:851c8c00 r4:851c8c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851c8c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c1d00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0621000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a238c r4:852a2000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a238c r4:846ce600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851c8c00 r8:846ce62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846ce600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ce600 r8:8027f5e8 r7:eadbde60 r6:85296c80 r5:851c8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c1d40 INFO: task kworker/0:319:4453 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a6cd4000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:320:4455 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:320 state:D stack:0 pid:4455 tgid:4455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaed5d84 r8:00000002 r7:60000013 r6:eaed5d8c r5:851cb000 r4:851cb000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851cb000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c1ec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a278c r4:852a2400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a278c r4:846ce680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851cb000 r8:846ce6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846ce680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ce680 r8:8027f5e8 r7:eadbde60 r6:85296d00 r5:851cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed5fb0 to 0xeaed5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c1980 INFO: task kworker/0:320:4455 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a6e33000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:321:4458 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:321 state:D stack:0 pid:4458 tgid:4458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaee5d84 r8:00000002 r7:60000113 r6:eaee5d8c r5:851cbc00 r4:851cbc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851cbc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8456e680 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0721000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a2f8c r4:852a2c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a2f8c r4:846ce780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851cbc00 r8:846ce7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846ce780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ce780 r8:8027f5e8 r7:eadbde60 r6:85296d80 r5:851cbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee5fb0 to 0xeaee5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c1f00 INFO: task kworker/0:321:4458 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a7108000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:322:4460 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:322 state:D stack:0 pid:4460 tgid:4460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaeedd84 r8:00000002 r7:60000113 r6:eaeedd8c r5:851cec00 r4:851cec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851cec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeede08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84934ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e076d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a338c r4:852a3000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a338c r4:846ce800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851cec00 r8:846ce82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846ce800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ce800 r8:8027f5e8 r7:eadbde60 r6:85296e00 r5:851cec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeedfb0 to 0xeaeedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84934b80 INFO: task kworker/0:322:4460 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a73d7000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:323:4462 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:323 state:D stack:0 pid:4462 tgid:4462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaef5d84 r8:00000002 r7:60000013 r6:eaef5d8c r5:851cd400 r4:851cd400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851cd400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846eba40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa81000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a478c r4:852a4400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a478c r4:846ce880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851cd400 r8:846ce8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846ce880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ce880 r8:8027f5e8 r7:eadbde60 r6:85296e80 r5:851cd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef5fb0 to 0xeaef5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c1d40 INFO: task kworker/0:323:4462 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a75ef000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:324:4463 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:324 state:D stack:0 pid:4463 tgid:4463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaef9d84 r8:00000002 r7:60000113 r6:eaef9d8c r5:851ce000 r4:851ce000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ce000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846eb040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89a5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a3b8c r4:852a3800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a3b8c r4:846ce900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ce000 r8:846ce92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846ce900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ce900 r8:8027f5e8 r7:eaef5e60 r6:85296f00 r5:851ce000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef9fb0 to 0xeaef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c1e80 INFO: task kworker/0:324:4463 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a75ef000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:325:4465 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:325 state:D stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaefdd84 r8:00000002 r7:60000013 r6:eaefdd8c r5:851cc800 r4:851cc800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851cc800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaefde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846eb300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89c3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a378c r4:852a3400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a378c r4:846ce700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851cc800 r8:846ce72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846ce700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ce700 r8:8027f5e8 r7:eaef5e60 r6:85296f80 r5:851cc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaefdfb0 to 0xeaefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846eb180 INFO: task kworker/0:325:4465 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a786e000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:326:4467 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:326 state:D stack:0 pid:4467 tgid:4467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf01d84 r8:00000002 r7:60000013 r6:eaf01d8c r5:8435d400 r4:8435d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8435d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf01e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846eb540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8435d400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89df000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519b78c r4:8519b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8519b78c r4:846cea00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8435d400 r8:846cea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846cea00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cea00 r8:8027f5e8 r7:eaef5e60 r6:84a78000 r5:8435d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf01fb0 to 0xeaf01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846eb240 INFO: task kworker/0:326:4467 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a7beb000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:327:4469 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:327 state:D stack:0 pid:4469 tgid:4469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf05d84 r8:00000002 r7:60000113 r6:eaf05d8c r5:851bbc00 r4:851bbc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851bbc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf05e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846eb580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa03000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a438c r4:852a4000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a438c r4:846cea80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851bbc00 r8:846ceaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846cea80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cea80 r8:8027f5e8 r7:eaef5e60 r6:84a78080 r5:851bbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf05fb0 to 0xeaf05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846eb580 INFO: task kworker/0:327:4469 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a7c4d000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:328:4471 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:328 state:D stack:0 pid:4471 tgid:4471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf11d84 r8:00000002 r7:60000113 r6:eaf11d8c r5:851d0000 r4:851d0000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf11e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846eb780 r5:00001000 r4:eaa3b000 r7:dddced80 r6:83018000 r5:852a4b8c r4:846ceb00 INFO: task kworker/0:328:4471 is blocked on a mutex likely owned by task kworker/1:152:3800. r4:82ac11e4 r5:00001000 r4:eced5000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:329 state:D stack:0 pid:4473 tgid:4473 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eaa9f000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:330:4477 blocked for more than 459 seconds. r10:829188dc r9:eaf19d84 r8:00000002 r7:60000013 r6:eaf19d8c r5:851d1800 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 Exception stack(0xe05e1fb0 to 0xe05e1ff8) Workqueue: events bpf_prog_free_deferred [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaab7000 r10:61c88647 r9:851d2400 r8:846cecac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:332:4480 blocked for more than 460 seconds. [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaadf000 r10:61c88647 r9:851d3000 r8:846ced2c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:00000001 r4:84a7ddc0 r10:829188dc r9:eaf3dd84 r8:00000002 r7:60000113 r6:eaf3dd8c r5:851d3c00 r9:83018005 r8:851d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a638c r4:852a6000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a638c r4:846ced80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d3c00 r8:846cedac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846ced80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ced80 r8:8027f5e8 r7:eaf19e60 r6:84a78380 r5:851d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf3dfb0 to 0xeaf3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846eba80 INFO: task kworker/0:333:4482 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a893e000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:334:4484 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:334 state:D stack:0 pid:4484 tgid:4484 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf41d84 r8:00000002 r7:60000113 r6:eaf41d8c r5:851d4800 r4:851d4800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d4800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf41e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84811d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851d4800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab0f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a678c r4:852a6400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a678c r4:846cee00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d4800 r8:846cee2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846cee00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cee00 r8:8027f5e8 r7:eaf19e60 r6:84a78400 r5:851d4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:335:4486 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:335 state:D stack:0 pid:4486 tgid:4486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf45d84 r8:00000002 r7:60000013 r6:eaf45d8c r5:851d5400 r4:851d5400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851d5400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf45e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84934100 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab27000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a6b8c r4:852a6800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a6b8c r4:846ce980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d5400 r8:846ce9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846ce980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eab43000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:852a6f8c r4:852a6c00 r7:dddced80 r6:83018000 r5:852a6f8c r4:846cef00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851d6000 r8:846cef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846cef00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cef00 r8:8027f5e8 r7:eaf19e60 r6:84a78500 r5:851d6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf49fb0 to 0xeaf49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a720c0 INFO: task kworker/0:336:4488 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a924c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eaf4dd84 r8:00000002 r7:60000113 r6:eaf4dd8c r5:851d6c00 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaba7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:851d6c00 r8:846ceeac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05e1fb0 to 0xe05e1ff8) INFO: task kworker/0:338:4492 blocked for more than 460 seconds. r4:85300000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf51e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc9000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:846cef80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cef80 r8:8027f5e8 r7:eaf19e60 r6:84a78600 r5:85300000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf51fb0 to 0xeaf51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a72440 INFO: task kworker/0:338:4492 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a9549000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:339:4494 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:339 state:D stack:0 pid:4494 tgid:4494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf65d84 r8:00000002 r7:60000113 r6:eaf65d8c r5:85300c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf65e08 r5:00001000 r4:eabf3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85300c00 r8:846e812c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:340:4497 blocked for more than 460 seconds. r4:85302400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf69e08 r9:83018005 r8:85302400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r5:00001000 r4:eac0f000 r5:852a3f8c r4:852a3c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a3f8c r4:846e8180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85302400 r8:846e81ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e8180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e8180 r8:8027f5e8 r7:eaf19e60 r6:84a78700 r5:85302400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf69fb0 to 0xeaf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a72700 INFO: task kworker/0:340:4497 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: a9759000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:341:4499 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:341 state:D stack:0 pid:4499 tgid:4499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf81d84 r8:00000002 r7:60000113 r6:eaf81d8c r5:85301800 r4:85301800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85301800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf81e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a72340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85301800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0115000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a878c r4:852a8400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a878c r4:846e8200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85301800 r8:846e822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e8200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e8200 r8:8027f5e8 r7:eaf19e60 r6:84a78780 r5:85301800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf81fb0 to 0xeaf81ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r4:e05e1dc0 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:342:4501 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:342 state:D stack:0 pid:4501 tgid:4501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf91d84 r8:00000002 r7:60000113 r6:eaf91d8c r5:85303c00 r4:85303c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85303c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e08 r4:00000000 r5:00001000 r4:eac37000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:852a8b8c r4:852a8800 r10:61c88647 r9:85303c00 r8:846e82ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) r4:82ac11e4 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85304800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf9de08 r5:00001000 r4:ead65000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaf9dfb0 to 0xeaf9dff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e1dc0 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:344:4505 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:344 state:D stack:0 pid:4505 tgid:4505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eafa1d84 r8:00000002 r7:60000013 r6:eafa1d8c r5:85305400 r4:85305400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85305400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a72ec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85305400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead75000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a938c r4:852a9000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a938c r4:846e8080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85305400 r8:846e80ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e8080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e8080 r8:8027f5e8 r7:eaf81e60 r6:84a78900 r5:85305400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa1fb0 to 0xeafa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a72e80 INFO: task kworker/0:344:4505 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:345 state:D stack:0 pid:4507 tgid:4507 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ead95000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeafa5fb0 to 0xeafa5ff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:eced5000 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:346:4509 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:346 state:D stack:0 pid:4509 tgid:4509 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae51d84 r8:00000002 r7:60000113 r6:eae51d8c r5:85306c00 r4:85306c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85306c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae51e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e5440 r5:00001000 r4:dfaa9000 r5:852a9b8c r4:852a9800 Exception stack(0xeae51fb0 to 0xeae51ff8) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 Exception stack(0xe05e1fb0 to 0xe05e1ff8) Workqueue: events bpf_prog_free_deferred [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfc73000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a9f8c r4:852a9c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a9f8c r4:846e8500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85308000 r8:846e852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e8500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e8500 r8:8027f5e8 r7:eaf81e60 r6:84a78a80 r5:85308000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae69fb0 to 0xeae69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a72ac0 INFO: task kworker/0:347:4511 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 Exception stack(0xe05e1d28 to 0xe05e1d70) r5:00001000 r4:eced5000 r4:846ded00 Not tainted 6.15.0-syzkaller #0 r4:00000000 r5:00001000 r4:eac39000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852abf8c r4:846e8580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85309800 r8:846e85ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e8580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e8580 r8:8027f5e8 r7:eaf81e60 r6:84a78b00 r5:85309800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafadfb0 to 0xeafadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846e5800 INFO: task kworker/0:348:4514 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe05e1d28 to 0xe05e1d70) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r9:83018005 r8:8530a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: aaace000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:00000001 r4:84a7ddc0 r10:829188dc r9:eafa9d84 r8:00000002 r7:60000013 r6:eafa9d8c r5:84755400 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab2100 INFO: task kworker/0:350:4517 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: aaf83000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Not tainted 6.15.0-syzkaller #0 r4:00000000 r5:00001000 r4:e05b3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeafb5fb0 to 0xeafb5ff8) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r5:00001000 r4:eced5000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eafb9d84 r8:00000002 r7:60000013 r6:eafb9d8c r5:84756c00 r4:84756c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84756c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab2600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84756c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e071d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852aaf8c r4:852aac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852aaf8c r4:846e8780 r10:00000000 r9:846e8780 r8:8027f5e8 r7:eafade60 r6:846e8900 r5:84756c00 Workqueue: events bpf_prog_free_deferred r4:e05e1dc0 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r4:84a7ddc0 r4:84754800 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84754800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0863000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ab38c r4:852ab000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ab38c r4:846e8880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84754800 r8:846e88ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e8880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e8880 r8:8027f5e8 r7:eafade60 r6:846e8a00 r5:84754800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafbdfb0 to 0xeafbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab2640 INFO: task kworker/0:353:4524 is blocked on a mutex likely owned by task kworker/1:152:3800. 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08 r5:00001000 r4:e08ad000 r7:dddced80 r6:83018000 r5:852ab78c r4:846e8980 r4:84ab27c0 Exception stack(0xe05e1d28 to 0xe05e1d70) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:355:4528 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:355 state:D stack:0 pid:4528 tgid:4528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eafc5d84 r8:00000002 r7:60000013 r6:eafc5d8c r5:84753000 r4:84753000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84753000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e493d000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84ab2940 r4:00000000 r4:82ac11e4 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:356:4529 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:356 state:D stack:0 pid:4529 tgid:4529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eafcdd84 r8:00000002 r7:60000113 r6:eafcdd8c r5:84798000 r4:84798000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84798000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafcde08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe05e1d28 to 0xe05e1d70) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:00001000 r4:eac4d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/0:358 state:D stack:0 pid:4534 tgid:4534 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eadc1000 r10:61c88647 r9:8479a400 r8:846e8e2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:359:4536 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:359 state:D stack:0 pid:4536 tgid:4536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eafd9d84 r8:00000002 r7:60000013 r6:eafd9d8c r5:8479bc00 r4:8479bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8479bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eadd1000 r10:61c88647 r9:8479bc00 r8:846e8f2c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829188dc r9:eafddd84 r8:00000002 r7:60000113 r6:eafddd8c r5:8479b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b538c r4:852b5000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b538c r4:846e8000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8479b000 r8:846e802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e8000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e8000 r8:8027f5e8 r7:eafd9e60 r6:84816f80 r5:8479b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafddfb0 to 0xeafddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ac70c0 INFO: task kworker/0:360:4538 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ac169000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeafe1fb0 to 0xeafe1ff8) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 r4:8479c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8479c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac77c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8479c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b5b8c r4:852b5800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b5b8c r4:84ac6080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8479c800 r8:84ac60ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ac6080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac6080 r8:8027f5e8 r7:eafe1e60 r6:84ac6280 r5:8479c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe5fb0 to 0xeafe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ac7480 INFO: task kworker/0:362:4542 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ac60c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r4:82ac11e4 r5:85c3938c r4:85c39000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84799800 r4:00000000 r9:83018005 r8:84799800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeafe9fb0 to 0xeafe9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ac7700 INFO: task kworker/0:363:4544 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ac8ce000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:e05e1dc0 r5:00001000 r4:eced5000 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd1e08 r5:00001000 r4:eaeb9000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84ac6300 r8:8027f5e8 r7:eafe1e60 r6:84ac6380 r5:8479ec00 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r4:00000000 r5:85c3938c r4:85c39000 r4:846ded00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8479e000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:852b678c r4:852b6400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b678c r4:84ac6400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8479e000 r8:84ac642c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ac6400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac6400 r8:8027f5e8 r7:eafd1e60 r6:84ac6480 r5:8479e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafedfb0 to 0xeafedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ac7b00 INFO: task kworker/0:365:4548 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: acd2d000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r4:852e0c00 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:852e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 r5:00001000 r4:eae97000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:852b638c r4:852b6000 r4:84ac6500 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:846ded00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff9e08 r5:00001000 r4:eaeab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:852b6b8c r4:852b6800 r10:61c88647 r9:852e1800 r8:84ac662c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:e05e1dc0 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:368:4555 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:368 state:D stack:0 pid:4555 tgid:4555 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaff1d84 r8:00000002 r7:60000113 r6:eaff1d8c r5:852e2400 r4:852e2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e2400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84acf580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb00f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b7f8c r4:852b7c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b7f8c r4:84ac6700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e2400 r8:84ac672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ac6700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac6700 r8:8027f5e8 r7:eafd1e60 r6:84ac6780 r5:852e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff1fb0 to 0xeaff1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab2f80 INFO: task kworker/0:368:4555 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ad1b1000 ece39000 00000001 80239b98 7f159000 00000001 r4:82ac11e4 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08 r5:00001000 r4:eaf2b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84ac6800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac6800 r8:8027f5e8 r7:eaff1e60 r6:84ac6900 r5:852e3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb001fb0 to 0xeb001ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84acf140 INFO: task kworker/0:369:4557 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ad3d9000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:370:4559 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:370 state:D stack:0 pid:4559 tgid:4559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:852e3c00 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaf6b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:852b738c r4:852b7000 r10:61c88647 r9:852e3c00 r8:84ac68ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:85c3938c r4:85c39000 r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:eaffdd84 r8:00000002 r7:60000113 r6:eaffdd8c r5:852e4800 r5:852e4800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84acf980 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb03b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bc38c r4:852bc000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852bc38c r4:84ac6980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e4800 r8:84ac69ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ac6980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac6980 r8:8027f5e8 r7:eaff1e60 r6:84ac6a80 r5:852e4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaffdfb0 to 0xeaffdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84acf240 INFO: task kworker/0:371:4560 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ad825000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:372:4563 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:372 state:D stack:0 pid:4563 tgid:4563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829188dc r9:eb00dd84 r8:00000002 r7:60000113 r6:eb00dd8c r5:852e5400 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb01f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84ac6b00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84a7ddc0 Not tainted 6.15.0-syzkaller #0 r4:852e6000 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb029e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84acf800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a7f8c r4:852a7c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a7f8c r4:84ac6c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e6000 r8:84ac6c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ac6c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac6c00 r8:8027f5e8 r7:eaffde60 r6:84ac6d00 r5:852e6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb029fb0 to 0xeb029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84acf100 INFO: task kworker/0:373:4565 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: adb93000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:374:4567 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08 r5:00001000 r4:eb053000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:375:4569 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:375 state:D stack:0 pid:4569 tgid:4569 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb045d84 r8:00000002 r7:60000013 r6:eb045d8c r5:852e0000 r4:852e0000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84acfbc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb047000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bcb8c r4:852bc800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852bcb8c r4:84ac6d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e0000 r8:84ac6dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ac6d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ac6d80 r8:8027f5e8 r7:eb035e60 r6:84ac6f00 r5:852e0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb045fb0 to 0xeb045ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84acf9c0 INFO: task kworker/0:375:4569 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: adf8c000 ece39000 00000001 80239b98 7f159000 00000001 r4:82ac11e4 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb051d84 r8:00000002 r7:60000113 r6:eb051d8c r5:849f0000 r4:849f0000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab2c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb09f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bdb8c r4:852bd800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84ac6e80 r8:8027f5e8 r7:eb035e60 r6:84ac6f80 r5:849f0000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e1d28 to 0xe05e1d70) r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb05f000 r5:852bd38c r4:852bd000 r10:61c88647 r9:8530e000 r8:85061f2c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ae6ec000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:378:4574 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:378 state:D stack:0 pid:4574 tgid:4574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb079d84 r8:00000002 r7:60000013 r6:eb079d8c r5:8530b000 r4:8530b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb079e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84acfe80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8530b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb06f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bcf8c r4:852bcc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852bcf8c r4:8533d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530b000 r8:8533d02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533d000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533d000 r8:8027f5e8 r7:eb051e60 r6:84a78d00 r5:8530b000 r4:00000001 Exception stack(0xeb079fb0 to 0xeb079ff8) r4:84acfe00 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r4:00000000 r5:00001000 r4:eced5000 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8530ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 r5:00001000 r4:eb087000 r5:8509bb8c r4:8509b800 r10:61c88647 r9:8530ec00 r8:84a78cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ad1980 INFO: task kworker/1:345:4577 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: aeb61000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:379:4578 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:379 state:D stack:0 pid:4578 tgid:4578 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829188dc r9:eb085d84 r8:00000002 r7:60000113 r6:eb085d8c r5:8530d400 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb08f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:852bd78c r4:852bd400 r4:8533d080 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 INFO: task kworker/1:346:4580 blocked for more than 461 seconds. r5:8530c800 r4:829188d8 r4:00000000 r4:00000000 r5:00001000 r4:e05fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:852d9b8c r4:84a78e80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:00000000 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:380:4582 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:380 state:D stack:0 pid:4582 tgid:4582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb09dd84 r8:00000002 r7:60000113 r6:eb09dd8c r5:85308c00 r4:85308c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85308c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb09de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85221040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85308c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0af000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bdf8c r4:852bdc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852bdf8c r4:8533d100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85308c00 r8:8533d12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533d100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533d100 r8:8027f5e8 r7:eb051e60 r6:84a78f00 r5:85308c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb09dfb0 to 0xeb09dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846ebcc0 INFO: task kworker/0:380:4582 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 1d20: af192000 ece39000 00000001 80239b98 7f159000 00000001 r4:e05e1dc0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 Not tainted 6.15.0-syzkaller #0 r4:8530bc00 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8530bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 r5:00001000 r4:eb0bf000 r5:852be38c r4:852be000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e1dc0 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:382:4586 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:382 state:D stack:0 pid:4586 tgid:4586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb0bdd84 r8:00000002 r7:60000113 r6:eb0bdd8c r5:85310c00 r4:85310c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85310c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0bde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852216c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85310c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0eb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852beb8c r4:852be800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852beb8c r4:8533d280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85310c00 r8:8533d2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533d280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533d280 r8:8027f5e8 r7:eb0ade60 r6:85224080 r5:85310c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0bdfb0 to 0xeb0bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85221080 INFO: task kworker/0:382:4586 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: af3b6000 ece39000 00000001 80239b98 7f159000 00000001 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85310000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 r5:00001000 r4:eb0cb000 r7:dddced80 r6:83018000 r5:852be78c r4:8533d300 r4:8533d300 Exception stack(0xeb0d5fb0 to 0xeb0d5ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852212c0 INFO: task kworker/0:383:4588 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: afaed000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:384:4590 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:384 state:D stack:0 pid:4590 tgid:4590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:85311800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08 r5:00001000 r4:eb0df000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8533d180 r8:8027f5e8 r7:eb0bde60 r6:85224180 r5:85311800 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f3000 r7:dddced80 r6:83018000 r5:852d9f8c r4:8533d380 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: afaed000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:386:4595 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:386 state:D stack:0 pid:4595 tgid:4595 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb109e08 r5:00001000 r4:eb10b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85314800 r8:8533d42c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: afaed000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:387:4601 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:387 state:D stack:0 pid:4601 tgid:4601 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfa5b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:852bff8c r4:8533d580 r10:00000000 r9:8533d580 r8:8027f5e8 r7:eb109e60 r6:8533d480 r5:849f1800 r4:84ad1340 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:388:4603 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:388 state:D stack:0 pid:4603 tgid:4603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb099d84 r8:00000002 r7:60000113 r6:eb099d8c r5:849f2400 r4:849f2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f2400 r4:829188d8 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:dfcf9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:389:4604 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:389 state:D stack:0 pid:4604 tgid:4604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb11dd84 r8:00000002 r7:60000113 r6:eb11dd8c r5:849f3000 r4:849f3000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f3000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac4080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaead000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dbf8c r4:852dbc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852dbf8c r4:8533d600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f3000 r8:8533d62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533d600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533d600 r8:8027f5e8 r7:eb099e60 r6:8533d780 r5:849f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb11dfb0 to 0xeb11dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8523c0c0 INFO: task kworker/0:389:4604 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b0800000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:849f3c00 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe71000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:849f3c00 r8:8533d82c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:84a7ddc0 Workqueue: events bpf_prog_free_deferred r5:849f4800 r4:829188d8 r4:00000000 r9:83018005 r8:849f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 r5:00001000 r4:e08a3000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:849f4800 r8:8533d92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523c0c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e1d28 to 0xe05e1d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:347:4608 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:347 state:D stack:0 pid:4608 tgid:4608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb131d84 r8:00000002 r7:60000113 r6:eb131d8c r5:85315400 r4:85315400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85315400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb131e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8523c040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85315400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852da38c r4:852da000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852da38c r4:85224300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85315400 r8:8522432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85224300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85224300 r8:8027f5e8 r7:eacede60 r6:85224400 r5:85315400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb131fb0 to 0xeb131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522f740 INFO: task kworker/1:347:4608 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b0b6d000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0737000 r7:ddde2d80 r6:83018200 r5:84712b8c r4:85224380 r4:85224380 5fa0: 00000000 00000000 00000000 00000000 Call trace: 1d20: b15be000 ece39000 00000001 80239b98 7f159000 00000001 r4:e05e1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:349:4611 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:349 state:D stack:0 pid:4611 tgid:4611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb119d84 r8:00000002 r7:60000113 r6:eb119d8c r5:85316000 r4:85316000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85316000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb119e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522fd00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85316000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0821000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8471238c r4:84712000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471238c r4:85224500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85316000 r8:8522452c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85224500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85224500 r8:8027f5e8 r7:eacede60 r6:85224600 r5:85316000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb119fb0 to 0xeb119ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8522f740 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e899f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84711b8c r4:85224580 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: b1fb7000 ece39000 00000001 80239b98 7f159000 00000001 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:351:4615 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:351 state:D stack:0 pid:4615 tgid:4615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb13dd84 r8:00000002 r7:60000113 r6:eb13dd8c r5:85303000 r4:85303000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85303000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb13de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f1c0 r5:00001000 r4:e89c5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8471138c r4:85224700 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:eced5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:352 state:D stack:0 pid:4617 tgid:4617 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb141e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85318c00 r8:8522482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522f200 Call trace: 1d20: b24f7000 ece39000 00000001 80239b98 7f159000 00000001 r4:e05e1dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:353:4619 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:353 state:D stack:0 pid:4619 tgid:4619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb145d84 r8:00000002 r7:60000013 r6:eb145d8c r5:85318000 r4:85318000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85318000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85221740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85318000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f478c r4:851f4400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f478c r4:85224880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85318000 r8:852248ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85224880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85224880 r8:8027f5e8 r7:eb141e60 r6:85224980 r5:85318000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb145fb0 to 0xeb145ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522fe40 INFO: task kworker/1:353:4619 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b29b9000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa69000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:851f4b8c r4:85224a00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8522fdc0 INFO: task kworker/1:354:4621 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b29b9000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:355:4623 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:355 state:D stack:0 pid:4623 tgid:4623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb151d84 r8:00000002 r7:60000113 r6:eb151d8c r5:849f6000 r4:849f6000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa93000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:851f4f8c r4:85224b00 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05e1d28 to 0xe05e1d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:85c3938c r4:85c39000 r4:846ded00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:356:4626 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:356 state:D stack:0 pid:4626 tgid:4626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb15dd84 r8:00000002 r7:60000013 r6:eb15dd8c r5:852e8000 r4:852e8000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e8000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85239000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab09000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f538c r4:851f5000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f538c r4:85224b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e8000 r8:85224bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85224b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85224b80 r8:8027f5e8 r7:eb145e60 r6:8533db80 r5:852e8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb15dfb0 to 0xeb15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852211c0 INFO: task kworker/1:356:4626 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r5:80000013 r4:80239bb0 r4:e05e1dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:846ded00 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08 r9:83018205 r8:852e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:00001000 r4:eaae5000 r7:ddde2d80 r6:83018200 r5:851f578c r4:85224a80 r4:85224a80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:358:4629 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:358 state:D stack:0 pid:4629 tgid:4629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb169d84 r8:00000002 r7:60000113 r6:eb169d8c r5:852ea400 r4:852ea400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ea400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb169e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852393c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f6b8c r4:851f6800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f6b8c r4:85224c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ea400 r8:85224cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eb16dd84 r8:00000002 r7:60000113 r6:eb16dd8c r5:852eb000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eab1d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f5f8c r4:851f5c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f5f8c r4:85224d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852eb000 r8:85224d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85224d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85224d00 r8:8027f5e8 r7:eb169e60 r6:8533dd00 r5:852eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb16dfb0 to 0xeb16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852391c0 INFO: task kworker/1:359:4631 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b4208000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eced5000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829188dc r9:eb179d84 r8:00000002 r7:60000113 r6:eb179d8c r5:852ed400 r5:00001000 r4:eab4b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f5b8c r4:851f5800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f5b8c r4:85224c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ed400 r8:85224c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85224c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85224c00 r8:8027f5e8 r7:eb169e60 r6:8533dd80 r5:852ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb179fb0 to 0xeb179ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85239280 INFO: task kworker/1:360:4634 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:e05e1dc0 r5:85c3938c r4:85c39000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:00001000 r4:eabdb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:363:4639 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:363 state:D stack:0 pid:4639 tgid:4639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb191d84 r8:00000002 r7:60000113 r6:eb191d8c r5:852ee000 r4:852ee000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ee000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eac33000 r7:ddde2d80 r6:83018200 r5:851f738c r4:85224e00 Workqueue: events bpf_prog_free_deferred r4:e05e1dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08 r5:00001000 r4:eac19000 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:829188dc r9:eb1a1d84 r8:00000002 r7:60000013 r6:eb1a1d8c r5:849f0c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85221d00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f8f8c r4:851f8c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f8f8c r4:8522c000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f0c00 r8:8522c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522c000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522c000 r8:8027f5e8 r7:eb191e60 r6:8533da00 r5:849f0c00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:80000013 r4:80239bb0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84840000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85239c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84840000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead6b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f778c r4:851f7400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f778c r4:8522c180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r4:e05e1dc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:367:4648 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:367 state:D stack:0 pid:4648 tgid:4648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb1b5d84 r8:00000002 r7:60000113 r6:eb1b5d8c r5:84842400 r4:84842400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84842400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85239d80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84842400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead85000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f7b8c r4:851f7800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f7b8c r4:8522c080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84842400 r8:8522c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522c080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522c080 r8:8027f5e8 r7:eb1a1e60 r6:85339000 r5:84842400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b5fb0 to 0xeb1b5ff8) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e1d28 to 0xe05e1d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:846ded00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:368 state:D stack:0 pid:4650 tgid:4650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb1bdd84 r8:00000002 r7:60000113 r6:eb1bdd8c r5:84840c00 r4:84840c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84840c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85239ec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84840c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadaf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f7f8c r4:851f7c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f7f8c r4:8522c200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84840c00 r8:8522c22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522c200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522c200 r8:8027f5e8 r7:eb1a1e60 r6:85339080 r5:84840c00 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b5ccc000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84841800 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaec5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:851f838c r4:8522c300 r10:00000000 r9:8522c300 r8:8027f5e8 r7:eb1a1e60 r6:85339100 r5:84841800 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:370:4653 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:370 state:D stack:0 pid:4653 tgid:4653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb1c9d84 r8:00000002 r7:60000113 r6:eb1c9d8c r5:84843000 r4:84843000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84843000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85239140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84843000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f878c r4:851f8400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f878c r4:8522c400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c9fb0 to 0xeb1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85239dc0 INFO: task kworker/1:370:4653 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b6316000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:371:4656 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:371 state:D stack:0 pid:4656 tgid:4656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb1e1d84 r8:00000002 r7:60000113 r6:eb1e1d8c r5:84844800 r4:84844800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84844800 r4:829188d8 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad8d00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84844800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb243000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fb38c r4:851fb000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fb38c r4:8522c280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84844800 r8:8522c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522c280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522c280 r8:8027f5e8 r7:eb1a1e60 r6:85339200 r5:84844800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e1fb0 to 0xeb1e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85221b00 INFO: task kworker/1:371:4656 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b6654000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:372:4658 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred r10:829188dc r9:eb1e5d84 r8:00000002 r7:60000113 r6:eb1e5d8c r5:84843c00 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb1d7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f938c r4:851f9000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f938c r4:8522c480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84843c00 r8:8522c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522c480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522c480 r8:8027f5e8 r7:eb1e1e60 r6:85339280 r5:84843c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e5fb0 to 0xeb1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ad8140 INFO: task kworker/1:372:4658 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b6654000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:373:4659 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:373 state:D stack:0 pid:4659 tgid:4659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb1f1d84 r8:00000002 r7:60000113 r6:eb1f1d8c r5:84846000 r4:84846000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84846000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad8380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84846000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f978c r4:851f9400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f978c r4:8522c500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84846000 r8:8522c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522c500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522c500 r8:8027f5e8 r7:eb1e1e60 r6:85339300 r5:84846000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f1fb0 to 0xeb1f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ad8340 INFO: task kworker/1:373:4659 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b67a1000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:374:4661 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:374 state:D stack:0 pid:4661 tgid:4661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb1fdd84 r8:00000002 r7:60000113 r6:eb1fdd8c r5:84846c00 r4:84846c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84846c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1fde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad84c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84846c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f9b8c r4:851f9800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f9b8c r4:8522c600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84846c00 r8:8522c62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522c600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522c600 r8:8027f5e8 r7:eb1e1e60 r6:85339380 r5:84846c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1fdfb0 to 0xeb1fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ad8480 INFO: task kworker/1:374:4661 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b6c92000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:375:4663 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:375 state:D stack:0 pid:4663 tgid:4663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb201d84 r8:00000002 r7:60000113 r6:eb201d8c r5:84845400 r4:84845400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84845400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb201e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad81c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84845400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb203000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f9f8c r4:851f9c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f9f8c r4:8522c580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84845400 r8:8522c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522c580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522c580 r8:8027f5e8 r7:eb1e1e60 r6:85339400 r5:84845400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb201fb0 to 0xeb201ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ad8500 INFO: task kworker/1:375:4663 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b6c92000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:376:4665 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:376 state:D stack:0 pid:4665 tgid:4665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb215d84 r8:00000002 r7:60000013 r6:eb215d8c r5:852e9800 r4:852e9800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852e9800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb215e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad87c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fa38c r4:851fa000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fa38c r4:8522c380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852e9800 r8:8522c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522c380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522c380 r8:8027f5e8 r7:eb1e1e60 r6:85339480 r5:852e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb215fb0 to 0xeb215ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ad82c0 INFO: task kworker/1:376:4665 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b70ed000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:377:4667 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:377 state:D stack:0 pid:4667 tgid:4667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb225d84 r8:00000002 r7:60000113 r6:eb225d8c r5:852f0000 r4:852f0000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb225e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad8880 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb21b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f8b8c r4:851f8800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851f8b8c r4:8522c700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f0000 r8:8522c72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522c700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522c700 r8:8027f5e8 r7:eb1e1e60 r6:85339500 r5:852f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb225fb0 to 0xeb225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ad8500 INFO: task kworker/1:377:4667 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b70ed000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:378:4669 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred r4:852f1800 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad8980 r5:00001000 r4:eb22b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fa78c r4:851fa400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fa78c r4:8522c680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f1800 r8:8522c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522c680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522c680 r8:8027f5e8 r7:eb1e1e60 r6:85339580 r5:852f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb235fb0 to 0xeb235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ad88c0 INFO: task kworker/1:378:4669 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b717c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:379:4671 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:379 state:D stack:0 pid:4671 tgid:4671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb239d84 r8:00000002 r7:60000113 r6:eb239d8c r5:852f2400 r4:852f2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f2400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb239e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad8b00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb23b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:852f2400 r8:8522c7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eb249d84 r8:00000002 r7:60000113 r6:eb249d8c r5:852f3000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfa9d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fbb8c r4:851fb800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fbb8c r4:8522c880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f3000 r8:8522c8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522c880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522c880 r8:8027f5e8 r7:eb1e1e60 r6:85339680 r5:852f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb249fb0 to 0xeb249ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ad8bc0 INFO: task kworker/1:380:4673 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b78c3000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb257000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:852f4800 r8:8522c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:382:4680 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:382 state:D stack:0 pid:4680 tgid:4680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb059d84 r8:00000002 r7:60000113 r6:eb059d8c r5:852f3c00 r4:852f3c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f3c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85221780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc23000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84710f8c r4:84710c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84710f8c r4:8522c980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f3c00 r8:8522c9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522c980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522c980 r8:8027f5e8 r7:eb249e60 r6:85339780 r5:852f3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb059fb0 to 0xeb059ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84acfe40 INFO: task kworker/1:382:4680 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e1d28 to 0xe05e1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:383:4681 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:383 state:D stack:0 pid:4681 tgid:4681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb075d84 r8:00000002 r7:60000113 r6:eb075d8c r5:852f5400 r4:852f5400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852f5400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb075e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522f840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e015d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fc38c r4:851fc000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fc38c r4:8522c800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852f5400 r8:8522c82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522c800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522c800 r8:8027f5e8 r7:eb059e60 r6:85339800 r5:852f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb075fb0 to 0xeb075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ad8fc0 INFO: task kworker/1:383:4681 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b7c0b000 ece39000 00000001 80239b98 7f159000 00000001 1d60: 80230ad4 80239bb0 80000013 ffffffff [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb081e08 r5:00001000 r4:eabd3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:852f6c00 r8:8522ca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522ca00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522ca00 r8:8027f5e8 r7:eb075e60 r6:85339880 r5:852f6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb081fb0 to 0xeb081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ad88c0 INFO: task kworker/1:384:4682 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b7fa6000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:82ac11e4 r4:00000000 r5:85c3938c r4:85c39000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:385 state:D stack:0 pid:4683 tgid:4683 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e05a9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8522ca80 r4:84ad88c0 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e1dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:386:4686 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:386 state:D stack:0 pid:4686 tgid:4686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb0a5d84 r8:00000002 r7:60000113 r6:eb0a5d8c r5:84838000 r4:84838000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84838000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85227300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84838000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07a7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fcf8c r4:851fcc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fcf8c r4:8522cb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84838000 r8:8522cb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8522cb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8522cb00 r8:8027f5e8 r7:eb081e60 r6:85339a00 r5:84838000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8522cc00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b8340000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:392:4690 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:392 state:D stack:0 pid:4690 tgid:4690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb0b9d84 r8:00000002 r7:60000113 r6:eb0b9d8c r5:8531e000 r4:8531e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8531e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aba900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8531e000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4927000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d8b8c r4:852d8800 r7:dddced80 r6:83018000 r5:852d8b8c r4:85339980 Exception stack(0xeb0b9fb0 to 0xeb0b9ff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:85c3938c r4:85c39000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:393:4692 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:393 state:D stack:0 pid:4692 tgid:4692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb0c9d84 r8:00000002 r7:60000113 r6:eb0c9d8c r5:8531d400 r4:8531d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8531d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abaa40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8531d400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac3b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d838c r4:852d8000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852d838c r4:85339b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531d400 r8:85339b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85339b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85339b00 r8:8027f5e8 r7:eb11de60 r6:8522cd00 r5:8531d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c9fb0 to 0xeb0c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84aba7c0 INFO: task kworker/0:393:4692 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b88f6000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eac93000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85339b80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:395:4696 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:395 state:D stack:0 pid:4696 tgid:4696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eacb1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85339a80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84a7ddc0 task:kworker/0:396 state:D stack:0 pid:4698 tgid:4698 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb101e08 r9:83018005 r8:8531a400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r5:00001000 r4:ead8d000 r5:852dab8c r4:852da800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852dab8c r4:85339c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531a400 r8:85339c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85339c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85339c00 r8:8027f5e8 r7:eb11de60 r6:8522ce80 r5:8531a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb101fb0 to 0xeb101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84abacc0 INFO: task kworker/0:396:4698 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b8e98000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:397:4700 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:397 state:D stack:0 pid:4700 tgid:4700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb265d84 r8:00000002 r7:60000113 r6:eb265d8c r5:8531c800 r4:8531c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb265e08 r5:00001000 r4:eadeb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8531c800 r8:85339d2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8531ec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb261e08 r5:00001000 r4:eae65000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:851fd78c r4:8522cf80 Exception stack(0xeb261fb0 to 0xeb261ff8) r4:84ac2440 INFO: task kworker/1:388:4702 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b913f000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:4704 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:4704 tgid:4704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb279d84 r8:00000002 r7:60000013 r6:eb279d8c r5:85316c00 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae45000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85316c00 r8:85339dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aba600 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b913f000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:399:4707 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:399 state:D stack:0 pid:4707 tgid:4707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb281d84 r8:00000002 r7:60000113 r6:eb281d8c r5:85320c00 r4:85320c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85320c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb281e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85227200 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85320c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 r5:00001000 r4:eae7d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85320c00 r8:85339e2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:389:4708 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:389 state:D stack:0 pid:4708 tgid:4708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb285d84 r8:00000002 r7:60000113 r6:eb285d8c r5:85321800 r4:85321800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85321800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb285e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac2c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85321800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae91000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ac27c0 INFO: task kworker/1:389:4708 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b9535000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb291e08 r5:00001000 r4:e076b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8538ef8c r4:85339e80 Exception stack(0xeb291fb0 to 0xeb291ff8) INFO: task kworker/0:400:4710 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b9ca6000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:390 state:D stack:0 pid:4712 tgid:4712 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eaa13000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: b9ca6000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:401:4714 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:401 state:D stack:0 pid:4714 tgid:4714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85324800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb299e08 r5:00001000 r4:eaf07000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85324800 r8:85339f2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 Not tainted 6.15.0-syzkaller #0 r5:85323c00 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaf55000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84ab9100 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a1fb0 to 0xeb2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ac40c0 INFO: task kworker/0:402:4716 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ba1ae000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eafc7000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e1fb0 to 0xe05e1ff8) Workqueue: events bpf_prog_free_deferred [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb011000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538cb8c r4:84ab9080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85326000 r8:84ab90ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ab9080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab9080 r8:8027f5e8 r7:eb291e60 r6:84acd480 r5:85326000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2bdfb0 to 0xeb2bdff8) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb02d000 r10:61c88647 r9:85325400 r8:84ab91ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb061000 r4:84ab9280 r4:84ac46c0 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: bae30000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:407:4726 blocked for more than 462 seconds. r4:00000000 r5:00001000 r4:eb07d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84ab9300 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08 r5:00001000 r4:eb091000 r4:84ab9380 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: bb1bb000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:8538db8c r4:8538d800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:410 state:D stack:0 pid:4732 tgid:4732 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac4dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8532c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd0f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538df8c r4:8538dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538df8c r4:84ab9480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8532c800 r8:84ab94ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ab9480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab9480 r8:8027f5e8 r7:eb291e60 r6:84acd780 r5:8532c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb155fb0 to 0xeb155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:e05e1dc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/0:411 state:D stack:0 pid:4734 tgid:4734 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:dff7b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:00000001 Not tainted 6.15.0-syzkaller #0 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: bc529000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:413 state:D stack:0 pid:4738 tgid:4738 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e06c5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538eb8c r4:8538e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538eb8c r4:84ab9600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8532d400 r8:84ab962c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ab9600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb1d1fb0 to 0xeb1d1ff8) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:414 state:D stack:0 pid:4740 tgid:4740 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eaa9d000 r4:84ab9680 INFO: task kworker/0:414:4740 is blocked on a mutex likely owned by task kworker/1:152:3800. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:415:4742 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:415 state:D stack:0 pid:4742 tgid:4742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829188dc r9:eb211d84 r8:00000002 r7:60000113 r6:eb211d8c r5:8532ec00 r9:83018005 r8:8532ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:85330000 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852323c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85330000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa59000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538f78c r4:8538f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538f78c r4:84ab9700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85330000 r8:84ab972c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ab9700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab9700 r8:8027f5e8 r7:eb1ede60 r6:84acda80 r5:85330000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:82ac11e4 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:391:4747 blocked for more than 463 seconds. [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:82ac11e4 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:417 state:D stack:0 pid:4750 tgid:4750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb2e5d84 r8:00000002 r7:60000113 r6:eb2e5d8c r5:85333000 r4:85333000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85333000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85232900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85333000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab29000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85390b8c r4:85390800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85390b8c r4:84ab9780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85333000 r8:84ab97ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ab9780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab9780 r8:8027f5e8 r7:eb1ede60 r6:84acdc00 r5:85333000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e5fb0 to 0xeb2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r5:00001000 r4:eced5000 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85232500 r5:8539038c r4:85390000 r10:00000000 r9:84ab9800 r8:8027f5e8 r7:eb2e5e60 r6:84acdc80 r5:85331800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e9fb0 to 0xeb2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852324c0 INFO: task kworker/0:418:4751 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: bdb3d000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:419 state:D stack:0 pid:4753 tgid:4753 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:85332400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539078c r4:85390400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539078c r4:84ab9880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85332400 r8:84ab98ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ab9880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab9880 r8:8027f5e8 r7:eb2e5e60 r6:84acdd00 r5:85332400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f1fb0 to 0xeb2f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ead93000 r4:84ab9a00 INFO: task kworker/0:420:4755 is blocked on a mutex likely owned by task kworker/1:152:3800. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:421:4757 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:421 state:D stack:0 pid:4757 tgid:4757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb2edd84 r8:00000002 r7:60000013 r6:eb2edd8c r5:8483c800 r4:8483c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8483c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08 r5:00001000 r4:eac27000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:851ff38c r4:84ab9900 INFO: task kworker/0:421:4757 is blocked on a mutex likely owned by task kworker/1:152:3800. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000001 task:kworker/1:392 state:D stack:0 pid:4760 tgid:4760 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e08fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84acde00 r8:8027f5e8 r7:eb081e60 r6:84ab9980 r5:8483ec00 1d20: bea16000 ece39000 00000001 80239b98 7f159000 00000001 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:393:4761 blocked for more than 463 seconds. task:kworker/1:393 state:D stack:0 pid:4761 tgid:4761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb2fdd84 r8:00000002 r7:60000113 r6:eb2fdd8c r5:8483bc00 r4:8483bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8483bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2fde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c14c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8483bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac03000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851fef8c r4:851fec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851fef8c r4:84acde80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8483bc00 r8:84acdeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84acde80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84acde80 r8:8027f5e8 r7:eb14de60 r6:84ab9b00 r5:8483bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2fdfb0 to 0xeb2fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe05e1d28 to 0xe05e1d70) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8483b000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:4765 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:4765 tgid:4765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb309d84 r8:00000002 r7:60000113 r6:eb309d8c r5:8483d400 r4:8483d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8483d400 r4:829188d8 r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:82ac11e4 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a7ddc0 r4:8483a400 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eaecf000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe05e1d28 to 0xe05e1d70) r4:00000000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:423:4769 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:423 state:D stack:0 pid:4769 tgid:4769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb315d84 r8:00000002 r7:60000013 r6:eb315d8c r5:84839800 r4:84839800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84839800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85236080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84839800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8539178c r4:85391400 Exception stack(0xeb315fb0 to 0xeb315ff8) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe05e1fb0 to 0xe05e1ff8) r4:8483e000 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb319e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85236580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8483e000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539138c r4:85391000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539138c r4:84ab9e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8483e000 r8:84ab9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ab9e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab9e00 r8:8027f5e8 r7:eb309e60 r6:84ab9f80 r5:8483e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:00001000 r4:eced5000 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c1a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaedf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ffb8c r4:851ff800 r10:61c88647 r9:852f0c00 r8:852c222c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb325e08 r5:00001000 r4:e00a5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:846ded00 INFO: task kworker/0:425:4777 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:425 state:D stack:0 pid:4777 tgid:4777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb329d84 r8:00000002 r7:60000013 r6:eb329d8c r5:849f6c00 r4:849f6c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f6c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb329e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85236840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ed000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85391b8c r4:85391800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85391b8c r4:85228000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f6c00 r8:8522802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85228000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85228000 r8:8027f5e8 r7:eb309e60 r6:85228080 r5:849f6c00 9fa0: 00000000 00000000 00000000 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85229e40 r7:dddced80 r6:83018000 r5:8539238c r4:85228180 r4:85236900 1d20: bfdcd000 ece39000 00000001 80239b98 7f159000 00000001 r5:85c3938c r4:85c39000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:00001000 r4:e0829000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85393f8c r4:85393c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85393f8c r4:85228280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85429800 r8:852282ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85228280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85228280 r8:8027f5e8 r7:eb32de60 r6:85228380 r5:85429800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb31dfb0 to 0xeb31dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85236980 INFO: task kworker/0:427:4782 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c006f000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e1fb0 to 0xe05e1ff8) task:kworker/1:398 state:D stack:0 pid:4785 tgid:4785 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e0183000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8471338c r4:84713000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471338c r4:852c2280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542a400 r8:852c22ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c2280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c2280 r8:8027f5e8 r7:eb14de60 r6:85228300 r5:8542a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f9fb0 to 0xeb2f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c1d80 INFO: task kworker/1:398:4785 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c0625000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:eced5000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8542b000 r4:829188d8 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e059f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:851fbf8c r4:852c2300 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb025fb0 to 0xeb025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c1880 INFO: task kworker/1:399:4787 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c0625000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb0e5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539278c r4:85392400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539278c r4:85228480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542bc00 r8:852284ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) INFO: task kworker/1:400:4790 blocked for more than 463 seconds. [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e07a9000 r5:8547038c r4:85470000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeb04dfb0 to 0xeb04dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c19c0 INFO: task kworker/1:400:4790 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c0b69000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:401:4792 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:401 state:D stack:0 pid:4792 tgid:4792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb24dd84 r8:00000002 r7:60000013 r6:eb24dd8c r5:8542d400 r4:8542d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8542d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eaded000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8547078c r4:85470400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:402:4794 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:402 state:D stack:0 pid:4794 tgid:4794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb29dd84 r8:00000002 r7:60000113 r6:eb29dd8c r5:8542e000 r4:8542e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8542e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8499a5c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8542e000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8989000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85470f8c r4:85470c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542e000 r8:852c252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c2500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c2500 r8:8027f5e8 r7:eb24de60 r6:85228680 r5:8542e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb29dfb0 to 0xeb29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c1580 INFO: task kworker/1:402:4794 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:eced5000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eac95000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:852c19c0 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 1d20: c1092000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:404:4798 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:404 state:D stack:0 pid:4798 tgid:4798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb331d84 r8:00000002 r7:60000113 r6:eb331d8c r5:85428000 r4:85428000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eacd5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:eced5000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84838c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r5:00001000 r4:eadc9000 r5:85471b8c r4:85471800 r7:ddde2d80 r6:83018200 r5:85471b8c r4:852c2380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84838c00 r8:852c23ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c2380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c2380 r8:8027f5e8 r7:eb24de60 r6:85228800 r5:84838c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb335fb0 to 0xeb335ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85234480 INFO: task kworker/1:405:4800 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c13e5000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r4:84870000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08 r5:00001000 r4:eae79000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85234500 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb33de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85234800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84870c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae5b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547238c r4:85472000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547238c r4:852c2780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84870c00 r8:852c27ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c2780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c2780 r8:8027f5e8 r7:eb339e60 r6:85228900 r5:84870c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb33dfb0 to 0xeb33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852340c0 INFO: task kworker/1:407:4804 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c185f000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:00001000 r4:eced5000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaf53000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85472f8c r4:852c2800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9b000 r7:ddde2d80 r6:83018200 r5:85471f8c r4:852c2680 Exception stack(0xeb345fb0 to 0xeb345ff8) Workqueue: events bpf_prog_free_deferred 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:410:4810 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:410 state:D stack:0 pid:4810 tgid:4810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb34dd84 r8:00000002 r7:60000113 r6:eb34dd8c r5:84873c00 r4:84873c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84873c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb34de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85234940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84873c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85472b8c r4:85472800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85472b8c r4:852c2900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84873c00 r8:852c292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c2900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c2900 r8:8027f5e8 r7:eb341e60 r6:85228a80 r5:84873c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb34dfb0 to 0xeb34dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85234640 INFO: task kworker/1:410:4810 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c1e7f000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb019000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:852c2880 9fa0: 00000000 00000000 00000000 00000000 r4:85234a00 INFO: task kworker/1:411:4813 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c26d7000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r4:84876000 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84876000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 r5:00001000 r4:eafc9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547378c r4:85473400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547378c r4:852c2a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84876000 r8:852c2a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c2a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c2a00 r8:8027f5e8 r7:eb359e60 r6:85228b80 r5:84876000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb35dfb0 to 0xeb35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85234c40 INFO: task kworker/1:412:4814 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c26d7000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:413:4817 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:413 state:D stack:0 pid:4817 tgid:4817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb365d84 r8:00000002 r7:60000013 r6:eb365d8c r5:84875400 r4:84875400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84875400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb365e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:85c3938c r4:85c39000 r4:846ded00 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:414 state:D stack:0 pid:4819 tgid:4819 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb369d84 r8:00000002 r7:60000113 r6:eb369d8c r5:84874800 r4:84874800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84874800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb369e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85232580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84874800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb03d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85473f8c r4:85473c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85473f8c r4:852c2a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84874800 r8:852c2aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c2a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c2a80 r8:8027f5e8 r7:eb365e60 r6:85228c80 r5:84874800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb369fb0 to 0xeb369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85234fc0 INFO: task kworker/1:414:4819 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c2b93000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 r5:85c3938c r4:85c39000 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 INFO: task kworker/1:415:4821 blocked for more than 464 seconds. [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522e000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85448c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb069000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851faf8c r4:851fac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851faf8c r4:852c2b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85448c00 r8:852c2b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c2b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c2b00 r8:8027f5e8 r7:eb365e60 r6:85228d00 r5:85448c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb389fb0 to 0xeb389ff8) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) INFO: task kworker/1:416:4822 blocked for more than 464 seconds. [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522e380 r5:00001000 r4:eb08d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:417:4824 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:417 state:D stack:0 pid:4824 tgid:4824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb391d84 r8:00000002 r7:60000013 r6:eb391d8c r5:8544a400 r4:8544a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8544a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb391e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522ea40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8544a400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547578c r4:85475400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547578c r4:852c2d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8544a400 r8:852c2d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c2d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c2d00 r8:8027f5e8 r7:eb365e60 r6:85228e00 r5:8544a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e1dc0 r5:00001000 r4:eced5000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:84a7ddc0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb385e08 r9:83018205 r8:8544b000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 r5:00001000 r4:eb175000 r7:ddde2d80 r6:83018200 r5:85474f8c r4:852c2c00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:85c3938c r4:85c39000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:419:4829 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:419 state:D stack:0 pid:4829 tgid:4829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb395d84 r8:00000002 r7:60000013 r6:eb395d8c r5:8544bc00 r4:8544bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8544bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522e780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8544bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb18d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547438c r4:85474000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547438c r4:852c2e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8544bc00 r8:852c2e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c2e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c2e00 r8:8027f5e8 r7:eb391e60 r6:85228f00 r5:8544bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb395fb0 to 0xeb395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522e340 INFO: task kworker/1:419:4829 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522d840 r5:00001000 r4:eb1e9000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:85475b8c r4:85228f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8544c800 r8:85228fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85228f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85228f80 r8:8027f5e8 r7:eb31de60 r6:85339f80 r5:8544c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb399fb0 to 0xeb399ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522ddc0 INFO: task kworker/0:429:4830 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c4249000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:420:4832 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:420 state:D stack:0 pid:4832 tgid:4832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb1b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e1d28 to 0xe05e1d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:421 state:D stack:0 pid:4834 tgid:4834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb3a1d84 r8:00000002 r7:60000013 r6:eb3a1d8c r5:8544e000 r4:8544e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8544e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522ee40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8544e000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb21d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547638c r4:85476000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547638c r4:852c2f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8544e000 r8:852c2f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c2f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c2f00 r8:8027f5e8 r7:eb391e60 r6:8533e000 r5:8544e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a1fb0 to 0xeb3a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522e9c0 INFO: task kworker/1:421:4834 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c479c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 Not tainted 6.15.0-syzkaller #0 Call trace: [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb24f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:430:4838 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:430 state:D stack:0 pid:4838 tgid:4838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb349d84 r8:00000002 r7:60000113 r6:eb349d8c r5:85336c00 r4:85336c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85336c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb349e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85229000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85336c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb209000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85392b8c r4:85392800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85392b8c r4:8533e180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85336c00 r8:8533e1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533e180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533e180 r8:8027f5e8 r7:eb31de60 r6:852c2f80 r5:85336c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb349fb0 to 0xeb349ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:852290c0 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:eced5000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb269000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85476b8c r4:852c2d80 Exception stack(0xeb3a9fb0 to 0xeb3a9ff8) r4:8522ed00 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe05e1fb0 to 0xe05e1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:4842 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:4842 tgid:4842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb3add84 r8:00000002 r7:60000113 r6:eb3add8c r5:85335400 r4:85335400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85335400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ade08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85229300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85335400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb23d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539338c r4:85393000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8539338c r4:8533e200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85335400 r8:8533e22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533e200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533e200 r8:8027f5e8 r7:eb31de60 r6:84acdf00 r5:85335400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3adfb0 to 0xeb3adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852292c0 INFO: task kworker/0:431:4842 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c4dc0000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85230ac0 r5:00001000 r4:eb3ed000 r7:ddde2d80 r6:83018200 r5:8547c38c r4:8523b000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb3b9d84 r8:00000002 r7:60000113 r6:eb3b9d8c r5:85438c00 r4:85438c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85438c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85230000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85438c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85476f8c r4:85476c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85476f8c r4:8523b080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85438c00 r8:8523b0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8523b080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523b080 r8:8027f5e8 r7:eb3b5e60 r6:8523b200 r5:85438c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b9fb0 to 0xeb3b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c1940 INFO: task kworker/1:425:4847 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c5645000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7ddc0 task:kworker/1:426 state:D stack:0 pid:4849 tgid:4849 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b1e08 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852302c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547738c r4:85477000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547738c r4:8523b180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8543a400 r8:8523b1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8523b180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523b180 r8:8027f5e8 r7:eb3b5e60 r6:8523b300 r5:8543a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b1fb0 to 0xeb3b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85230100 INFO: task kworker/1:426:4849 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e1dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) INFO: task kworker/1:427:4851 blocked for more than 464 seconds. [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85230440 r5:00001000 r4:eb2d1000 r5:8547778c r4:85477400 r10:61c88647 r9:8543b000 r8:8523b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85230200 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:432:4853 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:432 state:D stack:0 pid:4853 tgid:4853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb3bdd84 r8:00000002 r7:60000113 r6:eb3bdd8c r5:8543bc00 r4:8543bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8543bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3bde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85229b00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8543bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0093000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85392f8c r4:85392c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85392f8c r4:8533e280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8543bc00 r8:8533e2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533e280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533e280 r8:8027f5e8 r7:eb31de60 r6:8523b380 r5:8543bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3bdfb0 to 0xeb3bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:432:4853 is blocked on a mutex likely owned by task kworker/1:152:3800. 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8543c800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08 r5:00001000 r4:eb3c9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85477b8c r4:8523b500 Exception stack(0xeb3c5fb0 to 0xeb3c5ff8) Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:429 state:D stack:0 pid:4857 tgid:4857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb3d1d84 r8:00000002 r7:60000113 r6:eb3d1d8c r5:8543d400 r4:8543d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8543d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85230880 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3d5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85475f8c r4:85475c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85475f8c r4:8523b480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8543d400 r8:8523b4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8523b480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523b480 r8:8027f5e8 r7:eb3b5e60 r6:8523b680 r5:8543d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d1fb0 to 0xeb3d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85230580 INFO: task kworker/1:429:4857 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c659c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb3ddd84 r8:00000002 r7:60000013 r6:eb3ddd8c r5:8543e000 r4:8543e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8543e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3dde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85230940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3e1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85477f8c r4:85477c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85477f8c r4:8523b600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8543e000 r8:8523b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8523b600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523b600 r8:8027f5e8 r7:eb3b5e60 r6:8523b780 r5:8543e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3ddfb0 to 0xeb3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852307c0 INFO: task kworker/1:430:4859 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c659c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8543ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 r5:00001000 r4:eb405000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8543ec00 r8:8523b72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05e1d28 to 0xe05e1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:85c3938c r4:85c39000 r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:eb3f5d84 r8:00000002 r7:60000013 r6:eb3f5d8c r5:85439800 r4:00000000 r4:00000000 r5:00001000 r4:eb3f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8547c78c r4:8523b800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85439800 r8:8523b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8523b800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523b800 r8:8027f5e8 r7:eb3e9e60 r6:8523b980 r5:85439800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f5fb0 to 0xeb3f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852308c0 INFO: task kworker/1:432:4863 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c6f9f000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:433:4865 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:433 state:D stack:0 pid:4865 tgid:4865 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb401d84 r8:00000002 r7:60000113 r6:eb401d8c r5:85336000 r4:85336000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85336000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb401e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 r5:00001000 r4:dfa95000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:8547db8c r4:8523b900 r10:00000000 r9:8523b900 r8:8027f5e8 r7:eb3e9e60 r6:8523ba80 r5:85336000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e1d28 to 0xe05e1d70) 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:434:4866 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:434 state:D stack:0 pid:4866 tgid:4866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb411d84 r8:00000002 r7:60000113 r6:eb411d8c r5:84869800 r4:84869800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84869800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb411e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85230ec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84869800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb415000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547cf8c r4:8547cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547cf8c r4:8523ba00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84869800 r8:8523ba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8523ba00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523ba00 r8:8027f5e8 r7:eb401e60 r6:8533e100 r5:84869800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb411fb0 to 0xeb411ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85230d40 INFO: task kworker/1:434:4866 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e1d28 to 0xe05e1d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb421000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85230e00 INFO: task kworker/1:435:4868 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c788c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:436:4872 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb111e08 r5:00001000 r4:e4917000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8547ff8c r4:8547fc00 r10:61c88647 r9:8486a400 r8:8523bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ab6140 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829188dc r9:eb431d84 r8:00000002 r7:60000113 r6:eb431d8c r5:8486b000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb431e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cd2c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8486b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb51f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547d38c r4:8547d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547d38c r4:8523bb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486b000 r8:8523bbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8523bb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523bb80 r8:8027f5e8 r7:eb111e60 r6:8533e480 r5:8486b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb431fb0 to 0xeb431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab6040 INFO: task kworker/1:437:4873 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c82af000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e06f1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8539378c r4:85393400 r10:61c88647 r9:8486bc00 r8:8533e42c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb40dfb0 to 0xeb40dff8) r4:85229f40 Call trace: r4:00000000 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:4877 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:4877 tgid:4877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb439d84 r8:00000002 r7:60000113 r6:eb439d8c r5:85480c00 r4:85480c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85480c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8522d3c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85480c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89bd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85393b8c r4:85393800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85393b8c r4:8533e500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85480c00 r8:8533e52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533e500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533e500 r8:8027f5e8 r7:eb31de60 r6:8523bc80 r5:85480c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb439fb0 to 0xeb439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85229bc0 INFO: task kworker/0:434:4877 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 r5:85482400 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eab0b000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8533e680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533e680 r8:8027f5e8 r7:eb439e60 r6:8523bd00 r5:85482400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb445fb0 to 0xeb445ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522d180 INFO: task kworker/0:435:4880 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c9117000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:436:4881 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:436 state:D stack:0 pid:4881 tgid:4881 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb449d84 r8:00000002 r7:60000113 r6:eb449d8c r5:85483000 r4:85483000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85483000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abf080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85483000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa15000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a838c r4:853a8000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a838c r4:8533e600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85483000 r8:8533e62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533e600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533e600 r8:8027f5e8 r7:eb445e60 r6:8523bd80 r5:85483000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb449fb0 to 0xeb449ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abf2c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85480000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa77000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a878c r4:853a8400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a878c r4:8533e800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85480000 r8:8533e82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533e800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533e800 r8:8027f5e8 r7:eb445e60 r6:8523be00 r5:85480000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb451fb0 to 0xeb451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84abf0c0 INFO: task kworker/0:437:4883 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c9475000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e1fb0 to 0xe05e1ff8) task:kworker/0:438 state:D stack:0 pid:4885 tgid:4885 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb459e08 r5:00001000 r4:eaac7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb459fb0 to 0xeb459ff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:00001000 r4:eced5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:439:4886 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:439 state:D stack:0 pid:4886 tgid:4886 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb45dd84 r8:00000002 r7:60000113 r6:eb45dd8c r5:85484800 r4:85484800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85484800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abfbc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85484800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead53000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a9f8c r4:853a9c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a9f8c r4:8533e880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85484800 r8:8533e8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533e880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533e880 r8:8027f5e8 r7:eb445e60 r6:8523bf00 r5:85484800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb45dfb0 to 0xeb45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84abf380 INFO: task kworker/0:439:4886 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c9891000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eab35000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a8b8c r4:853a8800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a8b8c r4:8533e700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486d400 r8:8533e72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533e700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533e700 r8:8027f5e8 r7:eb45de60 r6:8533e980 r5:8486d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb455fb0 to 0xeb455ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84abf0c0 INFO: task kworker/0:440:4889 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: c9891000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 Not tainted 6.15.0-syzkaller #0 r4:8486e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08 r5:00001000 r4:eabcf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:853a978c r4:8533e900 Exception stack(0xeb461fb0 to 0xeb461ff8) Call trace: Exception stack(0xe05e1d28 to 0xe05e1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:442:4894 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:442 state:D stack:0 pid:4894 tgid:4894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb465d84 r8:00000002 r7:60000113 r6:eb465d8c r5:8486ec00 r4:8486ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8486ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb465e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abf8c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8486ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac07000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a9b8c r4:853a9800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853a9b8c r4:8533ea00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486ec00 r8:8533ea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8533ea00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8533ea00 r8:8027f5e8 r7:eb45de60 r6:8533eb00 r5:8486ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb465fb0 to 0xeb465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08 r5:00001000 r4:eaedb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:853aab8c r4:8533eb80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ca28a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:444:4898 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:444 state:D stack:0 pid:4898 tgid:4898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb471d84 r8:00000002 r7:60000113 r6:eb471d8c r5:84868000 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ead83000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:853aa38c r4:8533ec00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 INFO: task kworker/0:445:4900 blocked for more than 464 seconds. r4:85448000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb475e08 r5:00001000 r4:eadb1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:853aa78c r4:8533ed00 Exception stack(0xeb475fb0 to 0xeb475ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84abfb00 INFO: task kworker/0:445:4900 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ca28a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r5:84876c00 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb0e1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:853ab78c r4:8533ee00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 r5:84860000 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaeef000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8523e100 r8:8027f5e8 r7:eb479e60 r6:8523e080 r5:84860000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e1d28 to 0xe05e1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:448:4905 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:448 state:D stack:0 pid:4905 tgid:4905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb435d84 r8:00000002 r7:60000013 r6:eb435d8c r5:84860c00 r4:84860c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84860c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb435e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84860c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb159000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853abb8c r4:853ab800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:853abb8c r4:8523e000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84860c00 r8:8523e02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523e000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523e000 r8:8027f5e8 r7:eb479e60 r6:8523e180 r5:84860c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb435fb0 to 0xeb435ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8522d2c0 INFO: task kworker/0:448:4905 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cb30c000 ece39000 00000001 80239b98 7f159000 00000001 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:853ab38c r4:8523e200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:450:4910 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:450 state:D stack:0 pid:4910 tgid:4910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb489d84 r8:00000002 r7:60000013 r6:eb489d8c r5:84862400 r4:84862400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84862400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb489e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84862400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1db000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538ff8c r4:8538fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8538ff8c r4:8523e300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84862400 r8:8523e32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523e300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523e300 r8:8027f5e8 r7:eb435e60 r6:8523e400 r5:84862400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 r5:85c3938c r4:85c39000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a7ddc0 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb1a3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:853abf8c r4:8523e380 Exception stack(0xeb48dfb0 to 0xeb48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c83c0 INFO: task kworker/0:451:4912 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cbc75000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:846ded00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08 r5:00001000 r4:eb30b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85360f8c r4:85360c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85360f8c r4:8523e480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84863c00 r8:8523e4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523e480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523e480 r8:8027f5e8 r7:eb489e60 r6:8523e600 r5:84863c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb491fb0 to 0xeb491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c8540 INFO: task kworker/0:452:4914 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cbc75000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r9:83018005 r8:84864800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:eb499d84 r8:00000002 r7:60000113 r6:eb499d8c r5:84865400 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb2df000 r5:8536078c r4:85360400 r10:61c88647 r9:84865400 r8:8523e6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852c8840 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cbf84000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:455:4920 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:455 state:D stack:0 pid:4920 tgid:4920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb49dd84 r8:00000002 r7:60000113 r6:eb49dd8c r5:84866000 r4:84866000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84866000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852292c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84866000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4bf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:84a7ddc0 Workqueue: events bpf_prog_free_deferred r5:84866c00 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb4a7000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:85c3938c r4:85c39000 r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:457:4924 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:457 state:D stack:0 pid:4924 tgid:4924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb4a5d84 r8:00000002 r7:60000113 r6:eb4a5d8c r5:85458000 r4:85458000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85458000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85458000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85360b8c r4:85360800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85360b8c r4:8523ea00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85458000 r8:8523ea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523ea00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523ea00 r8:8027f5e8 r7:eb49de60 r6:8523ea80 r5:85458000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a5fb0 to 0xeb4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c8d40 INFO: task kworker/0:457:4924 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cc5b5000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb4cb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85361f8c r4:8523eb00 Exception stack(0xeb4bdfb0 to 0xeb4bdff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:459:4927 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:459 state:D stack:0 pid:4927 tgid:4927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb4b1d84 r8:00000002 r7:60000013 r6:eb4b1d8c r5:85459800 r4:85459800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85459800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85459800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8536238c r4:85362000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8536238c r4:8523eb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85459800 r8:8523ebac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523eb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523eb80 r8:8027f5e8 r7:eb4bde60 r6:8523ec80 r5:85459800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:460:4930 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:460 state:D stack:0 pid:4930 tgid:4930 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb4c9d84 r8:00000002 r7:60000113 r6:eb4c9d8c r5:8545a400 r4:8545a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8545a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c9e08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb4eb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:461:4931 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:461 state:D stack:0 pid:4931 tgid:4931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb4d5d84 r8:00000002 r7:60000013 r6:eb4d5d8c r5:8545b000 r4:8545b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8545b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb4e3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8545d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85362f8c r4:85362c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85362f8c r4:8523ef00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8545d400 r8:8523ef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8523ef00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8523ef00 r8:8027f5e8 r7:eb4c9e60 r6:8523ef80 r5:8545d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f5fb0 to 0xeb4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854c7600 INFO: task kworker/0:462:4934 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cd218000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 Not tainted 6.15.0-syzkaller #0 r5:8545e000 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb55f000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:463:4936 is blocked on a mutex likely owned by task kworker/1:152:3800. 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08 r5:00001000 r4:eb50b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8536338c r4:854ca000 r10:61c88647 r9:8545ec00 r8:854ca02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ca000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ca000 r8:8027f5e8 r7:eb501e60 r6:854ca180 r5:8545ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb509fb0 to 0xeb509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854c78c0 INFO: task kworker/0:464:4937 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cd814000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:85460000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 r5:00001000 r4:eb513000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 Not tainted 6.15.0-syzkaller #0 r4:85460c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb52de08 r5:00001000 r4:eb533000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85460c00 r8:854cf12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cdb2f000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:466:4943 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:466 state:D stack:0 pid:4943 tgid:4943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb531d84 r8:00000002 r7:60000113 r6:eb531d8c r5:85462400 r4:85462400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85462400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85462400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb007000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537d38c r4:8537d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537d38c r4:854ca300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85462400 r8:854ca32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ca300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ca300 r8:8027f5e8 r7:eb501e60 r6:854ca400 r5:85462400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb531fb0 to 0xeb531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e1dc0 r5:00001000 r4:eced5000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb53f000 r5:8547df8c r4:8547dc00 r10:61c88647 r9:85461800 r8:854cf0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cf080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cf080 r8:8027f5e8 r7:eb111e60 r6:854ca480 r5:85461800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb549fb0 to 0xeb549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854cd280 INFO: task kworker/1:439:4945 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cdf48000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:440:4947 blocked for more than 465 seconds. Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb553000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85464800 r8:854cf02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:85c3938c r4:85c39000 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 Not tainted 6.15.0-syzkaller #0 r5:85486c00 r4:829188d8 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cd9c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85486c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00bd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547ef8c r4:8547ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547ef8c r4:854cf180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85486c00 r8:854cf1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cf180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cf180 r8:8027f5e8 r7:eb111e60 r6:854cf280 r5:85486c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e1fb0 to 0xeb4e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854cd3c0 INFO: task kworker/1:441:4949 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ce8a5000 ece39000 00000001 80239b98 7f159000 00000001 r4:82ac11e4 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eb55dd84 r8:00000002 r7:60000113 r6:eb55dd8c r5:85485400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cda80 r5:00001000 r4:e050b000 r7:ddde2d80 r6:83018200 r5:8547f38c r4:854cf200 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85486000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb569e08 r5:00001000 r4:e06d1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547f78c r4:8547f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547f78c r4:854cf380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85486000 r8:854cf3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cf380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cf380 r8:8027f5e8 r7:eb111e60 r6:854cf400 r5:85486000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb569fb0 to 0xeb569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854cd3c0 INFO: task kworker/1:443:4955 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cf24a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:85483c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08 r5:00001000 r4:eacc1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8471438c r4:854cf480 dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 task:kworker/1:445 state:D stack:0 pid:4959 tgid:4959 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eac4b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547fb8c r4:8547f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547fb8c r4:854cf580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85488000 r8:854cf5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cf580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cf580 r8:8027f5e8 r7:eb56de60 r6:854cf680 r5:85488000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb571fb0 to 0xeb571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854cdc00 INFO: task kworker/1:445:4959 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cf76d000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:467:4962 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaf7d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85363f8c r4:854ca580 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:4963 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:4963 tgid:4963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb529d84 r8:00000002 r7:60000113 r6:eb529d8c r5:85489800 r4:85489800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85489800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7f40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85489800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaddb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540c78c r4:8540c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540c78c r4:854cf700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:447:4964 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:447 state:D stack:0 pid:4964 tgid:4964 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb579d84 r8:00000002 r7:60000013 r6:eb579d8c r5:8548a400 r4:8548a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8548a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb579e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cc440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8548a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540cb8c r4:8540c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540cb8c r4:854cf800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548a400 r8:854cf82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cf800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cf800 r8:8027f5e8 r7:eb529e60 r6:854cf880 r5:8548a400 r4:00000001 Exception stack(0xeb579fb0 to 0xeb579ff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: cfd75000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85463000 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eae43000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8540c38c r4:854cf900 Exception stack(0xeb585fb0 to 0xeb585ff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:84a7ddc0 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae73000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:854cfa00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d0003000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:450:4971 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:450 state:D stack:0 pid:4971 tgid:4971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb599d84 r8:00000002 r7:60000113 r6:eb599d8c r5:8545c800 r4:8545c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8545c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb599e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cc9c0 r5:00001000 r4:eb08b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe05e1d28 to 0xe05e1d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:85c3938c r4:85c39000 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 INFO: task kworker/1:451:4972 blocked for more than 465 seconds. r5:8545bc00 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaf09000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:852cc400 Call trace: 1d20: d05ce000 ece39000 00000001 80239b98 7f159000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r4:00000001 r4:84a7ddc0 r10:829188dc r9:eb5a1d84 r8:00000002 r7:60000013 r6:eb5a1d8c r5:85466c00 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cc7c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85466c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb021000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540db8c r4:8540d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540db8c r4:854cfb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85466c00 r8:854cfbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cfb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cfb80 r8:8027f5e8 r7:eb599e60 r6:854ca800 r5:85466c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a1fb0 to 0xeb5a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852cc300 INFO: task kworker/1:452:4975 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d083e000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 INFO: task kworker/1:453:4977 blocked for more than 465 seconds. r4:85463c00 r4:00000000 r4:00000000 r5:00001000 r4:eb055000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb5a5fb0 to 0xeb5a5ff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r4:846ded00 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:454:4979 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:454 state:D stack:0 pid:4979 tgid:4979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5a9d84 r8:00000002 r7:60000013 r6:eb5a9d8c r5:85465400 r4:85465400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85465400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb0f1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540eb8c r4:8540e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540eb8c r4:854cfc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85465400 r8:854cfcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cfc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cfc80 r8:8027f5e8 r7:eb599e60 r6:854ca880 r5:85465400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a9fb0 to 0xeb5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852cc380 INFO: task kworker/1:454:4979 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d0b11000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:455:4981 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:455 state:D stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5b1d84 r8:00000002 r7:60000013 r6:eb5b1d8c r5:84878c00 r4:84878c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84878c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b1e08 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540e38c r4:8540e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84878c00 r8:854cfd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b1fb0 to 0xeb5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852cca80 INFO: task kworker/1:455:4981 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d0cfc000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:468:4983 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:468 state:D stack:0 pid:4983 tgid:4983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5b5d84 r8:00000002 r7:60000113 r6:eb5b5d8c r5:8487a400 r4:8487a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8487a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84826340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8487a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497c38c r4:8497c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497c38c r4:854caa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487a400 r8:854caa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854caa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854caa00 r8:8027f5e8 r7:eb531e60 r6:854caa80 r5:8487a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b5fb0 to 0xeb5b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:852d4580 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d0cfc000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:456:4984 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:456 state:D stack:0 pid:4984 tgid:4984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5b9d84 r8:00000002 r7:60000113 r6:eb5b9d8c r5:84878000 r4:84878000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84878000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ccf00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84878000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1af000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540e78c r4:8540e400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540e78c r4:854cfd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84878000 r8:854cfdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cfd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cfd80 r8:8027f5e8 r7:eb5a9e60 r6:854cab00 r5:84878000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b9fb0 to 0xeb5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852cc880 INFO: task kworker/1:456:4984 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d164e000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:457:4986 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:457 state:D stack:0 pid:4986 tgid:4986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5bdd84 r8:00000002 r7:60000013 r6:eb5bdd8c r5:8487b000 r4:8487b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8487b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cce80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8487b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb17d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540ef8c r4:8540ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540ef8c r4:854cfe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487b000 r8:854cfe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cfe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cfe00 r8:8027f5e8 r7:eb5b9e60 r6:854cab80 r5:8487b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852ccc00 INFO: task kworker/1:457:4986 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d164e000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:458:4988 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:458 state:D stack:0 pid:4988 tgid:4988 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5c1d84 r8:00000002 r7:60000113 r6:eb5c1d8c r5:8487bc00 r4:8487bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8487bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cc680 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8487bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540f38c r4:8540f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540f38c r4:854cfe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487bc00 r8:854cfeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cfe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cfe80 r8:8027f5e8 r7:eb5b9e60 r6:854cac00 r5:8487bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c1fb0 to 0xeb5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852ccd00 INFO: task kworker/1:458:4988 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d164e000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:459:4990 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:459 state:D stack:0 pid:4990 tgid:4990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5c9d84 r8:00000002 r7:60000013 r6:eb5c9d8c r5:8487d400 r4:8487d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8487d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854cdf40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8487d400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb205000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540fb8c r4:8540f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540fb8c r4:854cfc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487d400 r8:854cfc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cfc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cfc00 r8:8027f5e8 r7:eb5c1e60 r6:854cac80 r5:8487d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c9fb0 to 0xeb5c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852ccf40 INFO: task kworker/1:459:4990 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d164e000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:460:4992 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:460 state:D stack:0 pid:4992 tgid:4992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5d1d84 r8:00000002 r7:60000113 r6:eb5d1d8c r5:8487ec00 r4:8487ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8487ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abbf80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8487ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8993000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541278c r4:85412400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541278c r4:854cff00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487ec00 r8:854cff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854cff00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854cff00 r8:8027f5e8 r7:eb5c9e60 r6:854cad00 r5:8487ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852cce40 INFO: task kworker/1:460:4992 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d1bb0000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:461:4994 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:461 state:D stack:0 pid:4994 tgid:4994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5d9d84 r8:00000002 r7:60000113 r6:eb5d9d8c r5:8487e000 r4:8487e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8487e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c7f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8487e000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb219000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540f78c r4:8540f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540f78c r4:84ad6100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487e000 r8:84ad612c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6100 r8:8027f5e8 r7:eb5d1e60 r6:854cad80 r5:8487e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d9fb0 to 0xeb5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852cc480 INFO: task kworker/1:461:4994 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d1bb0000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:462:4996 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:462 state:D stack:0 pid:4996 tgid:4996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5e1d84 r8:00000002 r7:60000113 r6:eb5e1d8c r5:8487c800 r4:8487c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8487c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abb040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8487c800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb23f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540ff8c r4:8540fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8540ff8c r4:84ad6080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487c800 r8:84ad60ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6080 r8:8027f5e8 r7:eb5d1e60 r6:854cae00 r5:8487c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e1fb0 to 0xeb5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854cdec0 INFO: task kworker/1:462:4996 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d22fc000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:463:4998 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:463 state:D stack:0 pid:4998 tgid:4998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5e9d84 r8:00000002 r7:60000113 r6:eb5e9d8c r5:85568c00 r4:85568c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85568c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abb2c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85568c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb259000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541038c r4:85410000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541038c r4:84ad6000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85568c00 r8:84ad602c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6000 r8:8027f5e8 r7:eb5d1e60 r6:854cae80 r5:85568c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e9fb0 to 0xeb5e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84abb240 INFO: task kworker/1:463:4998 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d22fc000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:464:5000 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:464 state:D stack:0 pid:5000 tgid:5000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5f1d84 r8:00000002 r7:60000113 r6:eb5f1d8c r5:85568000 r4:85568000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85568000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abb380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85568000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541078c r4:85410400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541078c r4:84ad6280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85568000 r8:84ad62ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6280 r8:8027f5e8 r7:eb5d1e60 r6:854caf00 r5:85568000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84abb3c0 INFO: task kworker/1:464:5000 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d258a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:465:5002 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:465 state:D stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5f9d84 r8:00000002 r7:60000013 r6:eb5f9d8c r5:8556b000 r4:8556b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abb5c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8556b000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85410f8c r4:85410c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85410f8c r4:84ad6300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556b000 r8:84ad632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6300 r8:8027f5e8 r7:eb5d1e60 r6:854caf80 r5:8556b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f9fb0 to 0xeb5f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84abb300 INFO: task kworker/1:465:5002 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d258a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:466:5004 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:466 state:D stack:0 pid:5004 tgid:5004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb601d84 r8:00000002 r7:60000113 r6:eb601d8c r5:8556bc00 r4:8556bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abb700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8556bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb355000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541138c r4:85411000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541138c r4:84ad6200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556bc00 r8:84ad622c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6200 r8:8027f5e8 r7:eb5d1e60 r6:8533ef00 r5:8556bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84abb500 INFO: task kworker/1:466:5004 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d2c63000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:467:5006 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:467 state:D stack:0 pid:5006 tgid:5006 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb609d84 r8:00000002 r7:60000113 r6:eb609d8c r5:85569800 r4:85569800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85569800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abb640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85569800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85410b8c r4:85410800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85410b8c r4:84ad6380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85569800 r8:84ad63ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6380 r8:8027f5e8 r7:eb5d1e60 r6:846e1000 r5:85569800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb609fb0 to 0xeb609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84abb740 INFO: task kworker/1:467:5006 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d2c63000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:468:5008 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:468 state:D stack:0 pid:5008 tgid:5008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb605d84 r8:00000002 r7:60000113 r6:eb605d8c r5:8548d400 r4:8548d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8548d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb605e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abb980 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8548d400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3d3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541178c r4:85411400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541178c r4:84ad6180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548d400 r8:84ad61ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6180 r8:8027f5e8 r7:eb5d1e60 r6:84ad6400 r5:8548d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb605fb0 to 0xeb605ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84abb340 INFO: task kworker/1:468:5008 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d2c63000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:469:5010 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:469 state:D stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb57dd84 r8:00000002 r7:60000013 r6:eb57dd8c r5:8548e000 r4:8548e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8548e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb57de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abbac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8548e000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85411b8c r4:85411800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85411b8c r4:84ad6480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548e000 r8:84ad64ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6480 r8:8027f5e8 r7:eb5d1e60 r6:84ad6580 r5:8548e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb57dfb0 to 0xeb57dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84abb8c0 INFO: task kworker/1:469:5010 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d355f000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:470:5013 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:470 state:D stack:0 pid:5013 tgid:5013 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb409d84 r8:00000002 r7:60000013 r6:eb409d8c r5:8548ec00 r4:8548ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8548ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb409e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abbc80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8548ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff81000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85411f8c r4:85411c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85411f8c r4:84ad6500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548ec00 r8:84ad652c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6500 r8:8027f5e8 r7:eb5d1e60 r6:84ad6600 r5:8548ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb409fb0 to 0xeb409ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84abba00 INFO: task kworker/1:470:5013 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d355f000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:471:5015 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:471 state:D stack:0 pid:5015 tgid:5015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb419d84 r8:00000002 r7:60000113 r6:eb419d8c r5:8548b000 r4:8548b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8548b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb419e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abbe00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8548b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541238c r4:85412000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541238c r4:84ad6680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548b000 r8:84ad66ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6680 r8:8027f5e8 r7:eb5d1e60 r6:84ad6780 r5:8548b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb419fb0 to 0xeb419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84abbbc0 INFO: task kworker/1:471:5015 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d39f1000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:472:5017 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:472 state:D stack:0 pid:5017 tgid:5017 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb42dd84 r8:00000002 r7:60000113 r6:eb42dd8c r5:8548c800 r4:8548c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8548c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb42de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d2280 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8548c800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa71000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85412b8c r4:85412800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85412b8c r4:84ad6700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548c800 r8:84ad672c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6700 r8:8027f5e8 r7:eb5d1e60 r6:84ad6880 r5:8548c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb42dfb0 to 0xeb42dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84abbe40 INFO: task kworker/1:472:5017 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d39f1000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:473:5018 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:473 state:D stack:0 pid:5018 tgid:5018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb581d84 r8:00000002 r7:60000013 r6:eb581d8c r5:8548bc00 r4:8548bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8548bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d2040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8548bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85412f8c r4:85412c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85412f8c r4:84ad6800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8548bc00 r8:84ad682c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6800 r8:8027f5e8 r7:eb42de60 r6:84ad6900 r5:8548bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb581fb0 to 0xeb581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84abbe40 INFO: task kworker/1:473:5018 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d3f84000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:474:5021 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:474 state:D stack:0 pid:5021 tgid:5021 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb43dd84 r8:00000002 r7:60000113 r6:eb43dd8c r5:85490000 r4:85490000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85490000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb43de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d2600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85490000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab1b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541378c r4:85413400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541378c r4:84ad6980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85490000 r8:84ad69ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6980 r8:8027f5e8 r7:eb42de60 r6:84ad6a00 r5:85490000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb43dfb0 to 0xeb43dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d2240 INFO: task kworker/1:474:5021 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d3f84000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:475:5023 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:475 state:D stack:0 pid:5023 tgid:5023 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb4add84 r8:00000002 r7:60000113 r6:eb4add8c r5:85490c00 r4:85490c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85490c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d2480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85490c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaadb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541338c r4:85413000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541338c r4:84ad6a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85490c00 r8:84ad6aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6a80 r8:8027f5e8 r7:eb43de60 r6:84ad6b80 r5:85490c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4adfb0 to 0xeb4adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d2100 INFO: task kworker/1:475:5023 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d42d0000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:476:5025 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:476 state:D stack:0 pid:5025 tgid:5025 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb4b9d84 r8:00000002 r7:60000013 r6:eb4b9d8c r5:85491800 r4:85491800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85491800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d2c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85491800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541838c r4:85418000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541838c r4:84ad6b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85491800 r8:84ad6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6b00 r8:8027f5e8 r7:eb43de60 r6:84ad6c80 r5:85491800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b9fb0 to 0xeb4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d24c0 INFO: task kworker/1:476:5025 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d497f000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:477:5027 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:477 state:D stack:0 pid:5027 tgid:5027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb4c5d84 r8:00000002 r7:60000113 r6:eb4c5d8c r5:85492400 r4:85492400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85492400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d2780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85492400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85413b8c r4:85413800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85413b8c r4:84ad6c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85492400 r8:84ad6c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6c00 r8:8027f5e8 r7:eb4b9e60 r6:84ad6d80 r5:85492400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c5fb0 to 0xeb4c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d26c0 INFO: task kworker/1:477:5027 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d497f000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:478:5028 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:478 state:D stack:0 pid:5028 tgid:5028 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb46dd84 r8:00000002 r7:60000113 r6:eb46dd8c r5:85493000 r4:85493000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85493000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d2900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85493000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac17000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85413f8c r4:85413c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85413f8c r4:84ad6d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85493000 r8:84ad6d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6d00 r8:8027f5e8 r7:eb4b9e60 r6:84ad6e00 r5:85493000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb46dfb0 to 0xeb46dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d27c0 INFO: task kworker/1:478:5028 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d497f000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:479:5030 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:479 state:D stack:0 pid:5030 tgid:5030 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb4d1d84 r8:00000002 r7:60000113 r6:eb4d1d8c r5:85493c00 r4:85493c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85493c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d2840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85493c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead6d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541878c r4:85418400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541878c r4:84ad6e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85493c00 r8:84ad6eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6e80 r8:8027f5e8 r7:eb4b9e60 r6:84ad6f80 r5:85493c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d1fb0 to 0xeb4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d2840 INFO: task kworker/1:479:5030 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d497f000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:480:5032 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:5032 tgid:5032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb4ddd84 r8:00000002 r7:60000113 r6:eb4ddd8c r5:85494800 r4:85494800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85494800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4dde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d2dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85494800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaedd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85418b8c r4:85418800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85418b8c r4:84ad6f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85494800 r8:84ad6f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ad6f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ad6f00 r8:8027f5e8 r7:eb4b9e60 r6:854cff80 r5:85494800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4ddfb0 to 0xeb4ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d2a80 INFO: task kworker/1:480:5032 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d497f000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:481:5034 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:481 state:D stack:0 pid:5034 tgid:5034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb4f1d84 r8:00000002 r7:60000113 r6:eb4f1d8c r5:85495400 r4:85495400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85495400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d2f40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85495400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85418f8c r4:85418c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85418f8c r4:846ac100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85495400 r8:846ac12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ac100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ac100 r8:8027f5e8 r7:eb4dde60 r6:846ac080 r5:85495400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f1fb0 to 0xeb4f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d2b40 INFO: task kworker/1:481:5034 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d51f0000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:482:5036 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:482 state:D stack:0 pid:5036 tgid:5036 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb4fdd84 r8:00000002 r7:60000113 r6:eb4fdd8c r5:85496000 r4:85496000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85496000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4fde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84684780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85496000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3df000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541a78c r4:8541a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541a78c r4:846ac000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85496000 r8:846ac02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ac000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ac000 r8:8027f5e8 r7:eb4f1e60 r6:846ac200 r5:85496000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4fdfb0 to 0xeb4fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d2980 INFO: task kworker/1:482:5036 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d5818000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:483:5038 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:483 state:D stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb519d84 r8:00000002 r7:60000113 r6:eb519d8c r5:85496c00 r4:85496c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85496c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abbcc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85496c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541938c r4:85419000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541938c r4:846ac180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85496c00 r8:846ac1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ac180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ac180 r8:8027f5e8 r7:eb4fde60 r6:846ac280 r5:85496c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb519fb0 to 0xeb519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84abbf40 INFO: task kworker/1:483:5038 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d5818000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:484:5040 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:484 state:D stack:0 pid:5040 tgid:5040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb525d84 r8:00000002 r7:60000113 r6:eb525d8c r5:85498000 r4:85498000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85498000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846840c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85498000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb16f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85419b8c r4:85419800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85419b8c r4:846ac300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85498000 r8:846ac32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ac300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ac300 r8:8027f5e8 r7:eb4fde60 r6:846ac380 r5:85498000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb525fb0 to 0xeb525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d2980 INFO: task kworker/1:484:5040 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d5818000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:485:5042 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:5042 tgid:5042 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb539d84 r8:00000002 r7:60000113 r6:eb539d8c r5:85498c00 r4:85498c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85498c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846842c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85498c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541978c r4:85419400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541978c r4:846ac400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85498c00 r8:846ac42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ac400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ac400 r8:8027f5e8 r7:eb4fde60 r6:846ac500 r5:85498c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb539fb0 to 0xeb539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84684080 INFO: task kworker/1:485:5042 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d5818000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:5045 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:5045 tgid:5045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb545d84 r8:00000002 r7:60000113 r6:eb545d8c r5:85499800 r4:85499800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85499800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb545e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84684480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85499800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb231000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85419f8c r4:85419c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85419f8c r4:846ac480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85499800 r8:846ac4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ac480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ac480 r8:8027f5e8 r7:eb4fde60 r6:846ac580 r5:85499800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb545fb0 to 0xeb545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84684000 INFO: task kworker/1:486:5045 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d6250000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:487:5047 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:487 state:D stack:0 pid:5047 tgid:5047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb565d84 r8:00000002 r7:60000013 r6:eb565d8c r5:8549a400 r4:8549a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8549a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb565e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84684600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8549a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541a38c r4:8541a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541a38c r4:846ac600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549a400 r8:846ac62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ac600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ac600 r8:8027f5e8 r7:eb4fde60 r6:846ac700 r5:8549a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb565fb0 to 0xeb565ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846844c0 INFO: task kworker/1:487:5047 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d6250000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:488:5049 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:488 state:D stack:0 pid:5049 tgid:5049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb60dd84 r8:00000002 r7:60000113 r6:eb60dd8c r5:8549b000 r4:8549b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8549b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846848c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8549b000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ef000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541ab8c r4:8541a800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541ab8c r4:846ac680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549b000 r8:846ac6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ac680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ac680 r8:8027f5e8 r7:eb4fde60 r6:846ac800 r5:8549b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb60dfb0 to 0xeb60dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846846c0 INFO: task kworker/1:488:5049 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d6576000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:489:5050 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:489 state:D stack:0 pid:5050 tgid:5050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb559d84 r8:00000002 r7:60000113 r6:eb559d8c r5:8549bc00 r4:8549bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8549bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84684d80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8549bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541b78c r4:8541b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541b78c r4:846ac780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549bc00 r8:846ac7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ac780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ac780 r8:8027f5e8 r7:eb60de60 r6:846ac880 r5:8549bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb559fb0 to 0xeb559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846847c0 INFO: task kworker/1:489:5050 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d6576000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:490:5052 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:490 state:D stack:0 pid:5052 tgid:5052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb611d84 r8:00000002 r7:60000013 r6:eb611d8c r5:8549c800 r4:8549c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8549c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84684a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8549c800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541af8c r4:8541ac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541af8c r4:846ac900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549c800 r8:846ac92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ac900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ac900 r8:8027f5e8 r7:eb559e60 r6:846aca00 r5:8549c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb611fb0 to 0xeb611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84684800 INFO: task kworker/1:490:5052 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d66ce000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:491:5055 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:491 state:D stack:0 pid:5055 tgid:5055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb615d84 r8:00000002 r7:60000113 r6:eb615d8c r5:8549d400 r4:8549d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8549d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84684c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8549d400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb41d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541b38c r4:8541b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541b38c r4:846ac980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549d400 r8:846ac9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ac980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ac980 r8:8027f5e8 r7:eb559e60 r6:846aca80 r5:8549d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb615fb0 to 0xeb615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84684a80 INFO: task kworker/1:491:5055 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d6afe000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:492:5057 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:492 state:D stack:0 pid:5057 tgid:5057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb61dd84 r8:00000002 r7:60000113 r6:eb61dd8c r5:8549e000 r4:8549e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8549e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb61de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84684f40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8549e000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541bf8c r4:8541bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541bf8c r4:846acb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8549e000 r8:846acb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846acb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846acb00 r8:8027f5e8 r7:eb559e60 r6:846acc00 r5:8549e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb61dfb0 to 0xeb61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84684cc0 INFO: task kworker/1:492:5057 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d6d49000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:493:5058 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:493 state:D stack:0 pid:5058 tgid:5058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb625d84 r8:00000002 r7:60000113 r6:eb625d8c r5:8556ec00 r4:8556ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb625e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84684dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8556ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541bb8c r4:8541b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8541bb8c r4:846acb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556ec00 r8:846acbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846acb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846acb80 r8:8027f5e8 r7:eb61de60 r6:846e1080 r5:8556ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb625fb0 to 0xeb625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84684cc0 INFO: task kworker/1:493:5058 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d6d49000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:5060 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:5060 tgid:5060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb62dd84 r8:00000002 r7:60000013 r6:eb62dd8c r5:8556c800 r4:8556c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c1000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8556c800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542478c r4:85424400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542478c r4:846acc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556c800 r8:846accac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846acc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846acc80 r8:8027f5e8 r7:eb625e60 r6:846e1100 r5:8556c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb62dfb0 to 0xeb62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84684e80 INFO: task kworker/1:494:5060 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d71a5000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:495:5062 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:495 state:D stack:0 pid:5062 tgid:5062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb635d84 r8:00000002 r7:60000113 r6:eb635d8c r5:8556e000 r4:8556e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb635e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d20c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8556e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ed000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542438c r4:85424000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542438c r4:846acd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556e000 r8:846acdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846acd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846acd80 r8:8027f5e8 r7:eb62de60 r6:846e1180 r5:8556e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb635fb0 to 0xeb635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84684f80 INFO: task kworker/1:495:5062 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d71a5000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:496:5064 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:496 state:D stack:0 pid:5064 tgid:5064 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb63dd84 r8:00000002 r7:60000013 r6:eb63dd8c r5:8556d400 r4:8556d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb63de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b96140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8556d400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb53b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85424b8c r4:85424800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85424b8c r4:846ace00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556d400 r8:846ace2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ace00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ace00 r8:8027f5e8 r7:eb62de60 r6:846e1200 r5:8556d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb63dfb0 to 0xeb63dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d2980 INFO: task kworker/1:496:5064 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d7ca3000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:5068 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:5068 tgid:5068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb591d84 r8:00000002 r7:60000113 r6:eb591d8c r5:8556a400 r4:8556a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb591e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b96380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8556a400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542538c r4:85425000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542538c r4:846ace80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556a400 r8:846aceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ace80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ace80 r8:8027f5e8 r7:eb63de60 r6:846e1280 r5:8556a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb591fb0 to 0xeb591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b962c0 INFO: task kworker/1:497:5068 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d7ca3000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:498:5069 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:5069 tgid:5069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5edd84 r8:00000002 r7:60000113 r6:eb5edd8c r5:84970000 r4:84970000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84970000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ede08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b96640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84970000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e017d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85425b8c r4:85425800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85425b8c r4:846acf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84970000 r8:846acf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846acf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846acf00 r8:8027f5e8 r7:eb591e60 r6:846e1300 r5:84970000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5edfb0 to 0xeb5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b96180 INFO: task kworker/1:498:5069 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d7ef5000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:499:5070 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:499 state:D stack:0 pid:5070 tgid:5070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb649d84 r8:00000002 r7:60000113 r6:eb649d8c r5:84971800 r4:84971800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84971800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb649e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c10c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84971800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e074f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537f78c r4:8537f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8537f78c r4:846acf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84971800 r8:846acfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846acf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846acf80 r8:8027f5e8 r7:eb5ede60 r6:846e1380 r5:84971800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb649fb0 to 0xeb649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b963c0 INFO: task kworker/1:499:5070 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d7ef5000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:500:5071 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:500 state:D stack:0 pid:5071 tgid:5071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb64dd84 r8:00000002 r7:60000113 r6:eb64dd8c r5:84972400 r4:84972400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84972400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb64de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b96780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84972400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542578c r4:85425400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542578c r4:846acd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84972400 r8:846acd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846acd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846acd00 r8:8027f5e8 r7:eb649e60 r6:846e1400 r5:84972400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb64dfb0 to 0xeb64dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b96680 INFO: task kworker/1:500:5071 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d8036000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:469:5076 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:469 state:D stack:0 pid:5076 tgid:5076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb645d84 r8:00000002 r7:60000113 r6:eb645d8c r5:84973000 r4:84973000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84973000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb645e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848260c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84973000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae4d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537c38c r4:8537c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537c38c r4:846e1480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84973000 r8:846e14ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e1480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e1480 r8:8027f5e8 r7:eb531e60 r6:846e1580 r5:84973000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb645fb0 to 0xeb645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84826280 INFO: task kworker/0:469:5076 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d866b000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:501:5078 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:501 state:D stack:0 pid:5078 tgid:5078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb621d84 r8:00000002 r7:60000013 r6:eb621d8c r5:84973c00 r4:84973c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84973c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb621e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c1240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84973c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0029000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85424f8c r4:85424c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85424f8c r4:84b8e100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84973c00 r8:84b8e12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8e100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8e100 r8:8027f5e8 r7:eb649e60 r6:846e1500 r5:84973c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb621fb0 to 0xeb621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b96080 INFO: task kworker/1:501:5078 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d8949000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:5080 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:5080 tgid:5080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb651d84 r8:00000002 r7:60000113 r6:eb651d8c r5:84974800 r4:84974800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84974800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb651e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848263c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84974800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae87000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537cb8c r4:8537c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537cb8c r4:846e1680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84974800 r8:846e16ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e1680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e1680 r8:8027f5e8 r7:eb531e60 r6:846e1600 r5:84974800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb651fb0 to 0xeb651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848263c0 INFO: task kworker/0:470:5080 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d8949000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:471:5082 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:471 state:D stack:0 pid:5082 tgid:5082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb655d84 r8:00000002 r7:60000113 r6:eb655d8c r5:84975400 r4:84975400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84975400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb655e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84975400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaec1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537c78c r4:8537c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537c78c r4:846e1700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84975400 r8:846e172c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e1700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e1700 r8:8027f5e8 r7:eb531e60 r6:84b8e080 r5:84975400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb655fb0 to 0xeb655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b91040 INFO: task kworker/0:471:5082 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d8b73000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:472:5084 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:472 state:D stack:0 pid:5084 tgid:5084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb665d84 r8:00000002 r7:60000113 r6:eb665d8c r5:85598000 r4:85598000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85598000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85598000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537eb8c r4:8537e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537eb8c r4:846e1780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85598000 r8:846e17ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e1780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e1780 r8:8027f5e8 r7:eb531e60 r6:84b8e000 r5:85598000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb665fb0 to 0xeb665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b91140 INFO: task kworker/0:472:5084 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d8cc7000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:473:5086 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:473 state:D stack:0 pid:5086 tgid:5086 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb66dd84 r8:00000002 r7:60000013 r6:eb66dd8c r5:8559a400 r4:8559a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8559a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8559a400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb031000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537cf8c r4:8537cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537cf8c r4:846e1800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559a400 r8:846e182c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e1800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e1800 r8:8027f5e8 r7:eb665e60 r6:84b8e180 r5:8559a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb66dfb0 to 0xeb66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b91200 INFO: task kworker/0:473:5086 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d908b000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:474:5088 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:474 state:D stack:0 pid:5088 tgid:5088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb675d84 r8:00000002 r7:60000013 r6:eb675d8c r5:85599800 r4:85599800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85599800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb675e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b912c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85599800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb089000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537d78c r4:8537d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537d78c r4:846e1980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85599800 r8:846e19ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e1980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e1980 r8:8027f5e8 r7:eb665e60 r6:84b8e200 r5:85599800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb675fb0 to 0xeb675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b912c0 INFO: task kworker/0:474:5088 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d91e7000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84a7ddc0 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb0d1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8537db8c r4:8537d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537db8c r4:846e1880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559bc00 r8:846e18ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e1880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e1880 r8:8027f5e8 r7:eb665e60 r6:84b8e280 r5:8559bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb67dfb0 to 0xeb67dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b91200 INFO: task kworker/0:475:5090 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d9487000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb129000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537df8c r4:8537dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:846e1a00 Exception stack(0xeb685fb0 to 0xeb685ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e1d28 to 0xe05e1d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:477:5094 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:477 state:D stack:0 pid:5094 tgid:5094 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb68dd84 r8:00000002 r7:60000113 r6:eb68dd8c r5:8559d400 r4:8559d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8559d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb68de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8559d400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537e38c r4:8537e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537e38c r4:846e1900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559d400 r8:846e192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e1900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e1900 r8:8027f5e8 r7:eb665e60 r6:84b8e380 r5:8559d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb68dfb0 to 0xeb68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b91700 INFO: task kworker/0:477:5094 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e1d28 to 0xe05e1d70) 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:478:5096 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:478 state:D stack:0 pid:5096 tgid:5096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb695d84 r8:00000002 r7:60070013 r6:eb695d8c r5:8559c800 r4:8559c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8559c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb695e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8559c800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537e78c r4:8537e400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537e78c r4:846e1a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559c800 r8:846e1aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e1a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e1a80 r8:8027f5e8 r7:eb665e60 r6:84b8e400 r5:8559c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb695fb0 to 0xeb695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b91740 INFO: task kworker/0:478:5096 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:479:5098 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:5098 tgid:5098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb69dd84 r8:00000002 r7:60000113 r6:eb69dd8c r5:8559ec00 r4:8559ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8559ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8559ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb22d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537ef8c r4:8537ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537ef8c r4:846e1b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559ec00 r8:846e1bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e1b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e1b80 r8:8027f5e8 r7:eb665e60 r6:84b8e480 r5:8559ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb69dfb0 to 0xeb69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b91a80 INFO: task kworker/0:479:5098 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: d9ce7000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:5100 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:480 state:D stack:0 pid:5100 tgid:5100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb6a5d84 r8:00000002 r7:60000113 r6:eb6a5d8c r5:8559e000 r4:8559e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8559e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9a300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8559e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec60f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534bb8c r4:8534b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534bb8c r4:846e1c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559e000 r8:846e1c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e1c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e1c00 r8:8027f5e8 r7:eb69de60 r6:84b8e500 r5:8559e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a5fb0 to 0xeb6a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b91bc0 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:481:5104 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:481 state:D stack:0 pid:5104 tgid:5104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb65dd84 r8:00000002 r7:60000113 r6:eb65dd8c r5:85598c00 r4:85598c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85598c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b91ec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85598c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89d5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537fb8c r4:8537f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537fb8c r4:846e1c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85598c00 r8:846e1cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e1c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e1c80 r8:8027f5e8 r7:eb6a5e60 r6:84b8e580 r5:85598c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb65dfb0 to 0xeb65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b91ac0 INFO: task kworker/0:481:5104 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: da13f000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85425f8c r4:84b8e680 Exception stack(0xeb6a9fb0 to 0xeb6a9ff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa8f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537ff8c r4:846e1d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496a400 r8:846e1d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e1d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e1d00 r8:8027f5e8 r7:eb6a5e60 r6:84b8e700 r5:8496a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b1fb0 to 0xeb6b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b91c40 INFO: task kworker/0:482:5108 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: da563000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8496b000 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8455a0c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8496b000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8537f38c r4:8537f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8537f38c r4:846e1d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496b000 r8:846e1dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846e1d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846e1d80 r8:8027f5e8 r7:eb6a5e60 r6:84b8e780 r5:8496b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b9fb0 to 0xeb6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b96dc0 INFO: task kworker/0:483:5109 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:503:5111 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:503 state:D stack:0 pid:5111 tgid:5111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb629d84 r8:00000002 r7:60000113 r6:eb629d8c r5:84976c00 r4:84976c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84976c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c1b00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84976c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead9b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542678c r4:85426400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8542678c r4:84b8e800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84976c00 r8:84b8e82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8e800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8e800 r8:8027f5e8 r7:eb6a9e60 r6:846e1e00 r5:84976c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb629fb0 to 0xeb629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:848c1740 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e1d28 to 0xe05e1d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe05e1fb0 to 0xe05e1ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6bde08 r5:00001000 r4:eac1f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b8e880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8e880 r8:8027f5e8 r7:eb629e60 r6:846e1b00 r5:84970c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6bdfb0 to 0xeb6bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c1700 INFO: task kworker/1:504:5113 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: dad5a000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:505:5116 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:505 state:D stack:0 pid:5116 tgid:5116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb6c5d84 r8:00000002 r7:60000113 r6:eb6c5d8c r5:84879800 r4:84879800 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1a5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84879800 r8:84b8e9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:506:5118 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:506 state:D stack:0 pid:5118 tgid:5118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb6cdd84 r8:00000002 r7:60000113 r6:eb6cdd8c r5:85570c00 r4:85570c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85570c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6cde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c1cc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85570c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85426b8c r4:85426800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85426b8c r4:84b8ea00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85570c00 r8:84b8ea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8ea00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8ea00 r8:8027f5e8 r7:eb6c5e60 r6:846e1f80 r5:85570c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6cdfb0 to 0xeb6cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c1b40 INFO: task kworker/1:506:5118 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 r4:85572400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d5e08 r5:00001000 r4:eb555000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8497cb8c r4:846e1f00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r4:00000001 r4:84a7ddc0 task:kworker/1:507 state:D stack:0 pid:5121 tgid:5121 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d9e08 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c1e40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85570000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85426f8c r4:85426c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85426f8c r4:84b8ea80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85570000 r8:84b8eaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8ea80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8ea80 r8:8027f5e8 r7:eb6c5e60 r6:8492e080 r5:85570000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d9fb0 to 0xeb6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c1d00 INFO: task kworker/1:507:5121 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: db60e000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:508 state:D stack:0 pid:5123 tgid:5123 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb127000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8542738c r4:84b8e900 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eb6e9d84 r8:00000002 r7:60000113 r6:eb6e9d8c r5:85573000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb2c9000 r5:8551438c r4:85514000 r7:ddde2d80 r6:83018200 r5:8551438c r4:84b8eb80 r4:84b8eb80 Exception stack(0xeb6e9fb0 to 0xeb6e9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c1880 INFO: task kworker/1:509:5125 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: dbb0c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:510:5127 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:510 state:D stack:0 pid:5127 tgid:5127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb6f1d84 r8:00000002 r7:60000113 r6:eb6f1d8c r5:85573c00 r4:85573c00 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb251000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85573c00 r8:84b8ec2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c1200 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:511:5129 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:511 state:D stack:0 pid:5129 tgid:5129 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85576000 r4:829188d8 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:85576000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb295000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85427f8c r4:85427c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85427f8c r4:84b8ed00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85576000 r8:84b8ed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8ed00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8ed00 r8:8027f5e8 r7:eb6e9e60 r6:8492e280 r5:85576000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f9fb0 to 0xeb6f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c1f40 INFO: task kworker/1:511:5129 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb403000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85223f00 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:513:5133 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:513 state:D stack:0 pid:5133 tgid:5133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb709d84 r8:00000002 r7:60000013 r6:eb709d8c r5:84976000 r4:84976000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84976000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb709e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84782280 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84976000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8551478c r4:84b8ed80 Exception stack(0xeb709fb0 to 0xeb709ff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb351000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:85c3938c r4:85c39000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847e1800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb719e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3bf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85514f8c r4:85514c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85514f8c r4:84b8eb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e1800 r8:84b8eb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8eb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8eb00 r8:8027f5e8 r7:eb701e60 r6:8492e480 r5:847e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb719fb0 to 0xeb719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84782480 INFO: task kworker/1:515:5137 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: dca48000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb725e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3d7000 r7:ddde2d80 r6:83018200 r5:8551538c r4:84b8ee80 Exception stack(0xeb725fb0 to 0xeb725ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84782540 INFO: task kworker/1:516:5140 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: dcd0f000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r5:85c3938c r4:85c39000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:517:5141 blocked for more than 467 seconds. r4:847e3c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847e3c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb729e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847828c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3eb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85515b8c r4:85515800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85515b8c r4:84b8ef00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e3c00 r8:84b8ef2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b8ef00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8ef00 r8:8027f5e8 r7:eb701e60 r6:8492e580 r5:847e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb729fb0 to 0xeb729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84782700 INFO: task kworker/1:517:5141 is blocked on a mutex likely owned by task kworker/1:152:3800. [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: dd117000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:846ded00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb541000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) r4:82ac11e4 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:519:5145 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:847e4800 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb427000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:847e4800 r8:84b9702c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84782900 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:eced5000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44d000 r7:ddde2d80 r6:83018200 r5:8551678c r4:84b97080 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:521 state:D stack:0 pid:5149 tgid:5149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb749d84 r8:00000002 r7:60000113 r6:eb749d8c r5:847e6c00 r4:847e6c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847e6c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb749e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84782c80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551638c r4:85516000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8551638c r4:84b97200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847e6c00 r8:84b9722c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b97200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97200 r8:8027f5e8 r7:eb735e60 r6:8492e780 r5:847e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb749fb0 to 0xeb749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84782b80 INFO: task kworker/1:521:5149 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: dda66000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7ddc0 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb4e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb759d84 r8:00000002 r7:60000113 r6:eb759d8c r5:85575400 r4:85575400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85575400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb759e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84782f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85575400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb515000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85516f8c r4:85516c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85516f8c r4:84b97300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85575400 r8:84b9732c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b97300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97300 r8:8027f5e8 r7:eb735e60 r6:8492e880 r5:85575400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb759fb0 to 0xeb759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84782e00 INFO: task kworker/1:523:5153 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ddcb3000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae71000 r7:ddde2d80 r6:83018200 r5:8551938c r4:84b97380 Exception stack(0xeb761fb0 to 0xeb761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84782bc0 INFO: task kworker/1:524:5155 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: de0dd000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85588c00 r4:00000000 r4:00000000 r5:00001000 r4:eb561000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8551738c r4:85517000 r10:61c88647 r9:85588c00 r8:84b9742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8455a140 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:526:5159 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:526 state:D stack:0 pid:5159 tgid:5159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb771d84 r8:00000002 r7:60000113 r6:eb771d8c r5:8558a400 r4:8558a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8558a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb771e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:00001000 r4:eb5ad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85517b8c r4:84b97480 1fa0: 00000000 00000000 00000000 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r4:00000000 r5:00001000 r4:dfb01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85517f8c r4:85517c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85517f8c r4:84b97500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85589800 r8:84b9752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b97500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97500 r8:8027f5e8 r7:eb761e60 r6:8492ea80 r5:85589800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f9fb0 to 0xeb1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b33200 INFO: task kworker/1:527:5161 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: de874000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r4:e05e1dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:528:5163 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:528 state:D stack:0 pid:5163 tgid:5163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb77dd84 r8:00000002 r7:60000113 r6:eb77dd8c r5:8558bc00 r4:8558bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8558bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb77de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e01b3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8551838c r4:85518000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 1d20: de874000 ece39000 00000001 80239b98 7f159000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0883000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8551878c r4:84b97600 Exception stack(0xeb785fb0 to 0xeb785ff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:530:5167 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:530 state:D stack:0 pid:5167 tgid:5167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb78dd84 r8:00000002 r7:60000013 r6:eb78dd8c r5:8558d400 r4:8558d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8558d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb78de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b33640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8558d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac81000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85518b8c r4:85518800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85518b8c r4:84b97580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558d400 r8:84b975ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b97580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97580 r8:8027f5e8 r7:eb761e60 r6:8492ec00 r5:8558d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb78dfb0 to 0xeb78dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b33380 INFO: task kworker/1:530:5167 is blocked on a mutex likely owned by task kworker/1:152:3800. r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:85c3938c r4:85c39000 r4:846ded00 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:531 state:D stack:0 pid:5169 tgid:5169 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaddd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85518f8c r4:84b97700 5fa0: 00000000 00000000 00000000 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:532 state:D stack:0 pid:5172 tgid:5172 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8558e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8558e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b33d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8558e000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb067000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551a38c r4:8551a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8551a38c r4:84b97680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558e000 r8:84b976ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b97680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97680 r8:8027f5e8 r7:eb761e60 r6:8492ed00 r5:8558e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a1fb0 to 0xeb7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b33880 INFO: task kworker/1:532:5172 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: df37d000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85c3938c r4:85c39000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r4:00000000 r5:00001000 r4:eaeb3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 r4:8558c800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ade08 r5:00001000 r4:eb009000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551978c r4:85519400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8551978c r4:84b97880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558c800 r8:84b978ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b97880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97880 r8:8027f5e8 r7:eb7a1e60 r6:8492ee00 r5:8558c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7adfb0 to 0xeb7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b33900 INFO: task kworker/1:534:5175 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: df7ea000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) r4:84a7ddc0 task:kworker/1:535 state:D stack:0 pid:5177 tgid:5177 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb641000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8551cf8c r4:84b97900 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 r5:85c3938c r4:85c39000 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 Not tainted 6.15.0-syzkaller #0 r5:84a82400 r4:829188d8 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b33e80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a82400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551a78c r4:8551a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8551a78c r4:84b97780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a82400 r8:84b977ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b97780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97780 r8:8027f5e8 r7:eb7b5e60 r6:8492ef00 r5:84a82400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7bdfb0 to 0xeb7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b33d80 INFO: task kworker/1:536:5179 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: dfdf1000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a81800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c5e08 r5:00001000 r4:eb17b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8551ab8c r4:84b97a00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:538:5183 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:538 state:D stack:0 pid:5183 tgid:5183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb7cdd84 r8:00000002 r7:60000113 r6:eb7cdd8c r5:84a80000 r4:84a80000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a80000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7cde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529d000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a80000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85519f8c r4:85519c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85519f8c r4:84b97a80 r10:00000000 r9:84b97a80 r8:8027f5e8 r7:eb7b5e60 r6:8524b000 r5:84a80000 Workqueue: events bpf_prog_free_deferred 1d20: e0848000 ece39000 00000001 80239b98 7f159000 00000001 r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:539:5185 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:539 state:D stack:0 pid:5185 tgid:5185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d5e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb207000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e1d28 to 0xe05e1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:540:5187 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:540 state:D stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb7ddd84 r8:00000002 r7:60000113 r6:eb7ddd8c r5:84a83c00 r4:84a83c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a83c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7dde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb241000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a83c00 r8:84b97bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb589000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8551bb8c r4:84b97980 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8529d300 INFO: task kworker/1:541:5189 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e1539000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:84a85400 r4:00000000 r4:00000000 r5:00001000 r4:eb5d5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:543:5193 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:543 state:D stack:0 pid:5193 tgid:5193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb7f5d84 r8:00000002 r7:60000113 r6:eb7f5d8c r5:85588000 r4:85588000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85588000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529d800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85588000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551bf8c r4:8551bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8551bf8c r4:84b97c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85588000 r8:84b97cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b97c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97c80 r8:8027f5e8 r7:eb7b5e60 r6:8524b280 r5:85588000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f5fb0 to 0xeb7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:00000000 r5:85c3938c r4:85c39000 r4:846ded00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb5fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8551c38c r4:84b97d80 dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r4:00000000 r5:85c3938c r4:85c39000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7ddc0 task:kworker/1:545 state:D stack:0 pid:5197 tgid:5197 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb631000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551c78c r4:8551c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8551c78c r4:84b97e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85610c00 r8:84b97e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b97e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97e00 r8:8027f5e8 r7:eb7b5e60 r6:8524b380 r5:85610c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb805fb0 to 0xeb805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8529d700 INFO: task kworker/1:545:5197 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e1d98000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb691000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8551db8c r4:84b97f00 Exception stack(0xeb80dfb0 to 0xeb80dff8) Workqueue: events bpf_prog_free_deferred 1d20: e2370000 ece39000 00000001 80239b98 7f159000 00000001 r4:00000000 r5:85c3938c r4:85c39000 r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 INFO: task kworker/1:547:5201 blocked for more than 468 seconds. task:kworker/1:547 state:D stack:0 pid:5201 tgid:5201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb815d84 r8:00000002 r7:60000113 r6:eb815d8c r5:85611800 r4:85611800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85611800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb815e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529dcc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85611800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb671000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551cb8c r4:8551c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8551cb8c r4:84b97e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85611800 r8:84b97eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b97e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97e80 r8:8027f5e8 r7:eb80de60 r6:8524b480 r5:85611800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb815fb0 to 0xeb815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8529dc40 INFO: task kworker/1:547:5201 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e2370000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r5:00001000 r4:eced5000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:548 state:D stack:0 pid:5203 tgid:5203 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 r5:00001000 r4:eb681000 r7:ddde2d80 r6:83018200 r5:8551d78c r4:84b97f80 dfa0: 00000000 00000000 00000000 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e293e000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a7ddc0 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb831000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551df8c r4:8551dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8551df8c r4:84b97d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85613000 r8:84b97d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b97d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b97d00 r8:8027f5e8 r7:eb80de60 r6:8524b580 r5:85613000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb825fb0 to 0xeb825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8529dec0 INFO: task kworker/1:549:5205 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e293e000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7ddc0 task:kworker/1:550 state:D stack:0 pid:5207 tgid:5207 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eb87d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8551f38c r4:85069100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85613c00 r8:8506912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85069100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069100 r8:8027f5e8 r7:eb825e60 r6:8524b600 r5:85613c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb82dfb0 to 0xeb82dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8529dd00 INFO: task kworker/1:550:5207 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e2c95000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7ddc0 task:kworker/1:551 state:D stack:0 pid:5209 tgid:5209 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eb83d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: e2c95000 ece39000 00000001 80239b98 7f159000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) Not tainted 6.15.0-syzkaller #0 Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb84dd84 r8:00000002 r7:60000013 r6:eb84dd8c r5:85616c00 r4:85616c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85616c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb84de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85616c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb849000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551e38c r4:8551e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8551e38c r4:85069180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85616c00 r8:850691ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85069180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069180 r8:8027f5e8 r7:eb82de60 r6:8524b700 r5:85616c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb84dfb0 to 0xeb84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8529df00 INFO: task kworker/1:552:5211 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e37cd000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7ddc0 task:kworker/1:553 state:D stack:0 pid:5213 tgid:5213 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb859000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe05e1d28 to 0xe05e1d70) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:554:5215 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:554 state:D stack:0 pid:5215 tgid:5215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb861d84 r8:00000002 r7:60000013 r6:eb861d8c r5:8496c800 r4:8496c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8496c800 r4:829188d8 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb861e08 r5:00001000 r4:eb865000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8551eb8c r4:85069280 Exception stack(0xeb861fb0 to 0xeb861ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8506c2c0 INFO: task kworker/1:554:5215 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e37cd000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:846ded00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb871000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506c4c0 r4:00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8496ec00 r4:00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c9c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8496ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551fb8c r4:8551f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8551fb8c r4:85069480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496ec00 r8:850694ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85069480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069480 r8:8027f5e8 r7:eb82de60 r6:85069580 r5:8496ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb879fb0 to 0xeb879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8506c500 INFO: task kworker/1:556:5219 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e41c2000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:00000000 r5:85c3938c r4:85c39000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:557 state:D stack:0 pid:5222 tgid:5222 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb86de08 r5:00001000 r4:eb6dd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:855e9b8c r4:85069500 r10:61c88647 r9:8496e000 r8:8506952c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85069500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069500 r8:8027f5e8 r7:eb879e60 r6:85069600 r5:8496e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb86dfb0 to 0xeb86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8506c880 INFO: task kworker/1:557:5222 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) r4:82ac11e4 r4:00000000 r5:85c3938c r4:85c39000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85614800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb70de08 r5:00001000 r4:e0643000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85069680 Exception stack(0xeb70dfb0 to 0xeb70dff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e05e1dc0 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eb72dd84 r8:00000002 r7:60000113 r6:eb72dd8c r5:85616000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e89b1000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e438c r4:855e4000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e438c r4:85069700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85616000 r8:8506972c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85069700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069700 r8:8027f5e8 r7:eb86de60 r6:8524b800 r5:85616000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb72dfb0 to 0xeb72dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8506ca40 INFO: task kworker/1:559:5225 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e47ad000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:560:5227 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:560 state:D stack:0 pid:5227 tgid:5227 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84748c00 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaaa7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:855e478c r4:85069800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84749800 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb88de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506cf00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84749800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab2f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e4b8c r4:855e4800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e4b8c r4:85069780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84749800 r8:850697ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85069780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 Exception stack(0xe05e1fb0 to 0xe05e1ff8) r5:8474a400 r4:829188d8 r5:00001000 r4:eabed000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000001 task:kworker/1:563 state:D stack:0 pid:5233 tgid:5233 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ead9d000 r7:ddde2d80 r6:83018200 r5:855e4f8c r4:85069a00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb899fb0 to 0xeb899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8506c300 INFO: task kworker/1:563:5233 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e5207000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:00000001 Workqueue: events bpf_prog_free_deferred r9:83018205 r8:8474b000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:84a7ddc0 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb115000 r10:00000000 r9:85069a80 r8:8027f5e8 r7:eb86de60 r6:8524bb00 r5:8474c800 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000001 task:kworker/1:566 state:D stack:0 pid:5239 tgid:5239 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb1cd000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1d60: 80230ad4 80239bb0 80000013 ffffffff r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:567:5241 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:567 state:D stack:0 pid:5241 tgid:5241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb8b9d84 r8:00000002 r7:60000113 r6:eb8b9d8c r5:8474e000 r4:8474e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8474e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85529540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8474e000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 r5:00001000 r4:eb267000 r7:ddde2d80 r6:83018200 r5:855e5f8c r4:85069900 Call trace: r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 Exception stack(0xe05e1fb0 to 0xe05e1ff8) r4:84a86000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r5:85c3938c r4:85c39000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:00001000 r4:eb301000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e6f8c r4:85069d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84748000 r8:85069d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85069d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069d00 r8:8027f5e8 r7:eb86de60 r6:8524bd00 r5:84748000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c9fb0 to 0xeb8c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85529440 INFO: task kworker/1:569:5245 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) r4:82ac11e4 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r5:00001000 r4:eb36b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeb8d1fb0 to 0xeb8d1ff8) Exception stack(0xe05e1d28 to 0xe05e1d70) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d9e08 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 Workqueue: events bpf_prog_free_deferred r5:00001000 r4:eb3f1000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:572:5251 is blocked on a mutex likely owned by task kworker/1:152:3800. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:84a7ddc0 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r7:ddde2d80 r6:83018200 r5:855e7b8c r4:85069c00 Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e6f09000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84a7ddc0 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb441000 r7:ddde2d80 r6:83018200 r5:855e7f8c r4:85069f00 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r7:ddde2d80 r6:83018200 r5:8551ff8c r4:85069f80 r10:00000000 r9:85069f80 r8:8027f5e8 r7:eb86de60 r6:854e8000 r5:8561d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f9fb0 to 0xeb8f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85529e80 INFO: task kworker/1:575:5257 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e7263000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb901e08 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8561b000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb50d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e878c r4:855e8400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e878c r4:85069e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561b000 r8:85069e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85069e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85069e00 r8:8027f5e8 r7:eb86de60 r6:854e8080 r5:8561b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85529c40 INFO: task kworker/1:576:5259 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e7263000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:846ded00 Not tainted 6.15.0-syzkaller #0 r4:8561ec00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c1440 r5:855e8b8c r4:855e8800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Not tainted 6.15.0-syzkaller #0 r4:84969800 r4:00000000 r5:00001000 r4:eb593000 r7:ddde2d80 r6:83018200 r5:855e838c r4:854e4000 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb90de08 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e9340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84968c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e8f8c r4:855e8c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e8f8c r4:854e4180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84968c00 r8:854e41ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854e4180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e4180 r8:8027f5e8 r7:eb86de60 r6:854e4200 r5:84968c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb90dfb0 to 0xeb90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e9180 INFO: task kworker/1:579:5265 is blocked on a mutex likely owned by task kworker/1:152:3800. r4:00000000 r4:e05e1dc0 r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb911e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:00001000 r4:eb6c9000 r10:61c88647 r9:855a0000 r8:854e432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e1d28 to 0xe05e1d70) r5:85c3938c r4:85c39000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb6ed000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e9f8c r4:855e9c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e9f8c r4:854e4480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a0c00 r8:854e44ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854e4480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e4480 r8:8027f5e8 r7:eb86de60 r6:854e4580 r5:855a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb91dfb0 to 0xeb91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:855ea38c r4:854e4500 Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 Exception stack(0xe05e1fb0 to 0xe05e1ff8) r4:855a2400 r4:00000000 r5:00001000 r4:eb955000 Exception stack(0xeb925fb0 to 0xeb925ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e9740 INFO: task kworker/1:584:5276 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e8a5b000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:585:5278 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb731000 r10:61c88647 r9:855a3000 r8:854e472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854e9c40 INFO: task kworker/1:585:5278 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e8d9b000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84a7ddc0 task:kworker/1:586 state:D stack:0 pid:5280 tgid:5280 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb745000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855eab8c r4:855ea800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855eab8c r4:854e4800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a3c00 r8:854e482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854e4800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e4800 r8:8027f5e8 r7:eb925e60 r6:854e4980 r5:855a3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb92dfb0 to 0xeb92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e9d40 INFO: task kworker/1:586:5280 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 Exception stack(0xe05e1d28 to 0xe05e1d70) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:855a4800 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:854e4900 r8:8027f5e8 r7:eb925e60 r6:854e4a00 r5:855a4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6fdfb0 to 0xeb6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e9d40 INFO: task kworker/1:587:5281 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e8fd0000 ece39000 00000001 80239b98 7f159000 00000001 r4:00000000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb93d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ebb8c r4:855eb800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855ebb8c r4:854e4a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a5400 r8:854e4aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854e4a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e4a80 r8:8027f5e8 r7:eb925e60 r6:854e4b00 r5:855a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb941fb0 to 0xeb941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854e9840 INFO: task kworker/1:588:5284 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e93c2000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r4:e05e1dc0 r5:00001000 r4:eced5000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7ddc0 Workqueue: events bpf_prog_free_deferred r5:855a6000 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb949000 r7:ddde2d80 r6:83018200 r5:855eb78c r4:854e4b80 Exception stack(0xeb94dfb0 to 0xeb94dff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e93c2000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 Not tainted 6.15.0-syzkaller #0 r4:00000000 r5:00001000 r4:eb96d000 r7:ddde2d80 r6:83018200 r5:855f078c r4:854e4c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854fd040 INFO: task kworker/1:590:5288 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e98e8000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:591:5290 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:591 state:D stack:0 pid:5290 tgid:5290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb965d84 r8:00000002 r7:60000013 r6:eb965d8c r5:855b0000 r4:855b0000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb965e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854fd8c0 r5:00001000 r4:eb961000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:855b0000 r8:854e4d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:591:5290 is blocked on a mutex likely owned by task kworker/1:152:3800. 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:592:5293 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:592 state:D stack:0 pid:5293 tgid:5293 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:855b2400 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854fdb00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb979000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f0b8c r4:855f0800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855f0b8c r4:854e4e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b2400 r8:854e4e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854e4e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e4e00 r8:8027f5e8 r7:eb959e60 r6:854e4f00 r5:855b2400 r4:00000001 Exception stack(0xeb935fb0 to 0xeb935ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e1d28 to 0xe05e1d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562a200 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f1f8c r4:855f1c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855f1f8c r4:854e4f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b3000 r8:854e4fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854e4f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854e4f80 r8:8027f5e8 r7:eb935e60 r6:84b8ef80 r5:855b3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb975fb0 to 0xeb975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854fdb80 INFO: task kworker/1:593:5295 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: e9c59000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:855b3c00 r4:829188d8 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb981e08 r4:00000000 r9:83018205 r8:855b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb985000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f0f8c r4:855f0c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855f0f8c r4:85622100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b3c00 r8:8562212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85622100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85622100 r8:8027f5e8 r7:eb975e60 r6:85622080 r5:855b3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb981fb0 to 0xeb981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854fdb40 INFO: task kworker/1:594:5297 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ea2fe000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85c3938c r4:85c39000 r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a7ddc0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb98de08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r5:85c3938c r4:85c39000 r4:846ded00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:596:5301 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:596 state:D stack:0 pid:5301 tgid:5301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb999d84 r8:00000002 r7:60000013 r6:eb999d8c r5:855b5400 r4:855b5400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b5400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb999e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854fdac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb99d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f178c r4:855f1400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855f178c r4:85622180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b5400 r8:856221ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85622180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85622180 r8:8027f5e8 r7:eb975e60 r6:85622300 r5:855b5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb999fb0 to 0xeb999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854fde00 INFO: task kworker/1:596:5301 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ea4ce000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:597:5303 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:597 state:D stack:0 pid:5303 tgid:5303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb9a5d84 r8:00000002 r7:60000013 r6:eb9a5d8c r5:855b6000 r4:855b6000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b6000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb9a9000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:597:5303 is blocked on a mutex likely owned by task kworker/1:152:3800. r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 Exception stack(0xe05e1d28 to 0xe05e1d70) 1d60: 80230ad4 80239bb0 80000013 ffffffff r4:82ac11e4 r4:e05e1dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:846ded00 Exception stack(0xe05e1fb0 to 0xe05e1ff8) task:kworker/1:598 state:D stack:0 pid:5305 tgid:5305 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85622380 r8:8027f5e8 r7:eb975e60 r6:85622500 r5:855b6c00 INFO: task kworker/1:598:5305 is blocked on a mutex likely owned by task kworker/1:152:3800. 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:599:5307 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:599 state:D stack:0 pid:5307 tgid:5307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb9bdd84 r8:00000002 r7:60000113 r6:eb9bdd8c r5:855b1800 r4:855b1800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b1800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9bde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562a440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f238c r4:855f2000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855f238c r4:85622480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b1800 r8:856224ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85622480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85622480 r8:8027f5e8 r7:eb9b1e60 r6:85622600 r5:855b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9bdfb0 to 0xeb9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8562a080 INFO: task kworker/1:599:5307 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ead75000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:600:5309 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:600 state:D stack:0 pid:5309 tgid:5309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb9c9d84 r8:00000002 r7:60000113 r6:eb9c9d8c r5:855a6c00 r4:855a6c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a6c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562ad40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba09000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f3b8c r4:855f3800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855f3b8c r4:85622580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a6c00 r8:856225ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85622580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85622580 r8:8027f5e8 r7:eb9b1e60 r6:85622700 r5:855a6c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: eb0f0000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:601:5310 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:601 state:D stack:0 pid:5310 tgid:5310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb931d84 r8:00000002 r7:60000013 r6:eb931d8c r5:855b8000 r4:855b8000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b8000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb931e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:eb9d9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85622680 r8:8027f5e8 r7:eb9c9e60 r6:85622780 r5:855b8000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e1d28 to 0xe05e1d70) 1d60: 80230ad4 80239bb0 80000013 ffffffff [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7ddc0 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d5e08 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f338c r4:855f3000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855f338c r4:85622800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b8c00 r8:8562282c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85622800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85622800 r8:8027f5e8 r7:eb9c9e60 r6:85622880 r5:855b8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d5fb0 to 0xeb9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8562a240 INFO: task kworker/1:602:5313 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: eb79c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84a7ddc0 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb9f1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85622900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85622900 r8:8027f5e8 r7:eb9c9e60 r6:85622980 r5:855b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e1fb0 to 0xeb9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8562a880 INFO: task kworker/1:603:5314 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: eb79c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:604:5316 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:604 state:D stack:0 pid:5316 tgid:5316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb9edd84 r8:00000002 r7:60000013 r6:eb9edd8c r5:855ba400 r4:855ba400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ba400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ede08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562ab80 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85622a00 r8:8027f5e8 r7:eb9c9e60 r6:85622b00 r5:855ba400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8562ab00 INFO: task kworker/1:604:5316 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ebc47000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) INFO: task kworker/1:605:5319 blocked for more than 469 seconds. r5:855bb000 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eadbf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb9f9fb0 to 0xeb9f9ff8) task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eced5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829188dc r9:eba05d84 r8:00000002 r7:60000013 r6:eba05d8c r5:855bbc00 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eba15000 r5:855fc38c r4:855fc000 r4:85622c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ec24c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:607:5323 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:607 state:D stack:0 pid:5323 tgid:5323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba11d84 r8:00000002 r7:60000113 r6:eba11d8c r5:855bc800 r4:855bc800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855bc800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba11e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e9840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb0d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fc78c r4:855fc400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855fc78c r4:85622d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855bc800 r8:85622d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85622d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85622d00 r8:8027f5e8 r7:eb9f9e60 r6:85622d80 r5:855bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba11fb0 to 0xeba11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8562ae80 INFO: task kworker/1:607:5323 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ec24c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:608:5325 blocked for more than 469 seconds. Workqueue: events bpf_prog_free_deferred r4:855bd400 r5:855bd400 r4:829188d8 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb76de08 r5:00001000 r4:e0537000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fcf8c r4:855fcc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855fcf8c r4:85622e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855bd400 r8:85622e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85622e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85622e00 r8:8027f5e8 r7:eb9f9e60 r6:85622f00 r5:855bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb76dfb0 to 0xeb76dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8563d1c0 INFO: task kworker/1:608:5325 is blocked on a mutex likely owned by task kworker/1:152:3800. task:kworker/1:152 state:R running task stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e1d28 to 0xe05e1d70) 1d20: ec24c000 ece39000 00000001 80239b98 7f159000 00000001 1d40: 82ac05a0 7f159000 ece39000 8280c930 82ac11c4 e05e1da4 e05e1da8 e05e1d78 1d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e1dc0 r5:e05e1e08 r4:e05e1dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f15b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3938c r4:85c39000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:855be000 r5:855be000 r4:829188d8 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e4961000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85622e80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3ec00 r8:80200be4 r7:e05e1d5c r6:ffffffff r5:84a3ec00 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c3938c r4:846ded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:846ded2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded00 r8:8027f5e8 r7:e0571e60 r6:84ab3400 r5:84a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7ddc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:610:5329 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:610 state:D stack:0 pid:5329 tgid:5329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb781d84 r8:00000002 r7:60000013 r6:eb781d8c r5:855bec00 r4:855bec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855bec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb781e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d40c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 r5:00001000 r4:eb5e3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ff78c r4:855ff400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:855bec00 r8:855c012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8563d480 Workqueue: events bpf_prog_free_deferred r4:00000000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:82ac11e4 r4:e05e5dc0 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:611:5330 blocked for more than 469 seconds. Workqueue: events bpf_prog_free_deferred r5:85500000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba1de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563d680 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85500000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae83000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fd78c r4:855fd400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855fd78c r4:855c0000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85500000 r8:855c002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855c0000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c0000 r8:8027f5e8 r7:eb781e60 r6:855c0180 r5:85500000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba1dfb0 to 0xeba1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8563d580 INFO: task kworker/1:611:5330 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 7facf000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 90000013 ffffffff r5:90000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:612:5333 blocked for more than 469 seconds. task:kworker/1:612 state:D stack:0 pid:5333 tgid:5333 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eaf6d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:855c0200 r8:8027f5e8 r7:eb781e60 r6:855c0280 r5:85500c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb799fb0 to 0xeb799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8563d6c0 INFO: task kworker/1:612:5333 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 7facf000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 90000013 ffffffff r5:90000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:613:5335 blocked for more than 469 seconds. [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85501800 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 r5:00001000 r4:eb049000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 Exception stack(0xe05e5d28 to 0xe05e5d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:614:5337 blocked for more than 469 seconds. r10:829188dc r9:eb819d84 r8:00000002 r7:60000113 r6:eb819d8c r5:85502400 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb0e3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fdb8c r4:855fd800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855fdb8c r4:855c0380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85502400 r8:855c03ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855c0380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c0380 r8:8027f5e8 r7:eb781e60 r6:855c0500 r5:85502400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb819fb0 to 0xeb819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8563d5c0 INFO: task kworker/1:614:5337 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 8087c000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:615:5339 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:615 state:D stack:0 pid:5339 tgid:5339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb835d84 r8:00000002 r7:60000113 r6:eb835d8c r5:85503000 r4:85503000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85503000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb835e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563db80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85503000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fe78c r4:855fe400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855fe78c r4:855c0480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85503000 r8:855c04ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855c0480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c0480 r8:8027f5e8 r7:eb781e60 r6:855c0600 r5:85503000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb835fb0 to 0xeb835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8563da80 INFO: task kworker/1:615:5339 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 8087c000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:616:5341 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:616 state:D stack:0 pid:5341 tgid:5341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb841d84 r8:00000002 r7:60000013 r6:eb841d8c r5:85503c00 r4:85503c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85503c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb841e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563de40 r5:00001000 r4:eb1f5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85503c00 r8:855c05ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:617:5343 blocked for more than 469 seconds. r5:85504800 r4:829188d8 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb245000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fef8c r4:855fec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855fef8c r4:855c0680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85504800 r8:855c06ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855c0680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c0680 r8:8027f5e8 r7:eb781e60 r6:855c0800 r5:85504800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb851fb0 to 0xeb851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8563de80 INFO: task kworker/1:617:5343 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 80f79000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:618:5345 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:618 state:D stack:0 pid:5345 tgid:5345 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba21d84 r8:00000002 r7:60000013 r6:eba21d8c r5:85505400 r4:85505400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85505400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb5cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855ff38c r4:855c0780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85505400 r8:855c07ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855c0780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c0780 r8:8027f5e8 r7:eb781e60 r6:855c0900 r5:85505400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba21fb0 to 0xeba21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8563d640 INFO: task kworker/1:618:5345 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 80f79000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:e05e5dc0 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7de40 task:kworker/1:619 state:D stack:0 pid:5347 tgid:5347 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb639000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fff8c r4:855ffc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855fff8c r4:855c0880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85506000 r8:855c08ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855c0880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c0880 r8:8027f5e8 r7:eb781e60 r6:855c0a00 r5:85506000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba25fb0 to 0xeba25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855d4180 INFO: task kworker/1:619:5347 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d60: 80230ad4 80239bb0 80000013 ffffffff r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eba29d84 r8:00000002 r7:60000013 r6:eba29d8c r5:85506c00 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb617000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85506c00 r8:855c09ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:621:5351 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:621 state:D stack:0 pid:5351 tgid:5351 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb687000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:855c0a80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 task:kworker/1:622 state:D stack:0 pid:5353 tgid:5353 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb66f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85508c00 r8:855c0bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:85509800 r4:00000000 r5:00001000 r4:eb699000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85509800 r8:855c0cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7de40 task:kworker/1:624 state:D stack:0 pid:5356 tgid:5356 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d4c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8550a400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb791000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f0f8c r4:856f0c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f0f8c r4:855c0d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550a400 r8:855c0dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855c0d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c0d80 r8:8027f5e8 r7:eba3de60 r6:855c0e80 r5:8550a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b9fb0 to 0xeb7b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855d4100 INFO: task kworker/1:624:5356 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 82b13000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:625:5358 blocked for more than 469 seconds. r10:829188dc r9:eba41d84 r8:00000002 r7:60000113 r6:eba41d8c r5:8550b000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb779000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeba41fb0 to 0xeba41ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:626:5360 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:626 state:D stack:0 pid:5360 tgid:5360 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba45d84 r8:00000002 r7:60000113 r6:eba45d8c r5:8550bc00 r4:8550bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8550bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba45e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d4dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8550bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f138c r4:856f1000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f138c r4:85640100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550bc00 r8:8564012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85640100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85640100 r8:8027f5e8 r7:eb7b9e60 r6:85640080 r5:8550bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba45fb0 to 0xeba45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855d4780 INFO: task kworker/1:626:5360 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 8314e000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:e05e5dc0 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:627 state:D stack:0 pid:5362 tgid:5362 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba49e08 r9:83018205 r8:8550c800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 r5:00001000 r4:eb7e1000 r5:856f238c r4:856f2000 r10:61c88647 r9:8550c800 r8:8564002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d28 to 0xe05e5d70) r4:82ac11e4 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:628:5365 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:628 state:D stack:0 pid:5365 tgid:5365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba4dd84 r8:00000002 r7:60000113 r6:eba4dd8c r5:8550d400 r4:8550d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8550d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba4de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d4f80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8550d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f178c r4:856f1400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f178c r4:85640180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550d400 r8:856401ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85640180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85640180 r8:8027f5e8 r7:eba49e60 r6:85640280 r5:8550d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba4dfb0 to 0xeba4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855d4e00 INFO: task kworker/1:628:5365 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 839e0000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:629:5367 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:629 state:D stack:0 pid:5367 tgid:5367 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8550e000 r4:829188d8 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba55e08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb7d1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f1b8c r4:856f1800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85640300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85640300 r8:8027f5e8 r7:eba49e60 r6:85640380 r5:8550e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba55fb0 to 0xeba55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85647300 INFO: task kworker/1:629:5367 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 839e0000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:630:5369 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:630 state:D stack:0 pid:5369 tgid:5369 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba59d84 r8:00000002 r7:60000113 r6:eba59d8c r5:8550ec00 r4:8550ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8550ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba59e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85647bc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8550ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r5:00001000 r4:eb867000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8550ec00 r8:8564042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eba51d84 r8:00000002 r7:60000013 r6:eba51d8c r5:85678000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb7f1000 r5:856f1f8c r4:856f1c00 r10:61c88647 r9:85678000 r8:8564052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85647180 INFO: task kworker/1:631:5370 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 84a7a000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:632:5371 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:632 state:D stack:0 pid:5371 tgid:5371 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba5dd84 r8:00000002 r7:60000013 r6:eba5dd8c r5:85678c00 r4:85678c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85678c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba5de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb809000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85678c00 r8:8564062c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7de40 task:kworker/1:633 state:D stack:0 pid:5375 tgid:5375 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:8474d400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r5:00001000 r4:eb821000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 5d60: 80230ad4 80239bb0 80000013 ffffffff [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba75e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85647a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb845000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f338c r4:856f3000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f338c r4:85640780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c8c00 r8:856407ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85640780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85640780 r8:8027f5e8 r7:eba59e60 r6:854e8200 r5:849c8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba75fb0 to 0xeba75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85647580 INFO: task kworker/1:634:5377 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 8554b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:635 state:D stack:0 pid:5378 tgid:5378 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb857000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856f378c r4:856f3400 r7:ddde2d80 r6:83018200 r5:856f378c r4:85640880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c9800 r8:856408ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85640880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85640880 r8:8027f5e8 r7:eba59e60 r6:854e8280 r5:849c9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba79fb0 to 0xeba79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85647880 INFO: task kworker/1:635:5378 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 85ac2000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:636:5381 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:636 state:D stack:0 pid:5381 tgid:5381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba85d84 r8:00000002 r7:60000013 r6:eba85d8c r5:849c8000 r4:849c8000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c8000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba85e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85647f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f838c r4:856f8000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f838c r4:85640900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c8000 r8:8564092c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85640900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85640900 r8:8027f5e8 r7:eba59e60 r6:854e8300 r5:849c8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba85fb0 to 0xeba85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85647b80 INFO: task kworker/1:636:5381 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 86846000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:82ac11e4 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:637 state:D stack:0 pid:5382 tgid:5382 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba89e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb875000 r5:856f3f8c r4:856f3c00 r10:61c88647 r9:849ca400 r8:856409ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 5d60: 80230ad4 80239bb0 80000013 ffffffff [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:638:5384 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:638 state:D stack:0 pid:5384 tgid:5384 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba91d84 r8:00000002 r7:60000113 r6:eba91d8c r5:849cb000 r4:849cb000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cb000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba91e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85647dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba97000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f3b8c r4:856f3800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f3b8c r4:85640800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cb000 r8:8564082c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85640800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85640800 r8:8027f5e8 r7:eba85e60 r6:854e8400 r5:849cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba91fb0 to 0xeba91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85647880 INFO: task kworker/1:638:5384 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 86e64000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84a7de40 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebab3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:856f878c r4:85640a80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:640:5390 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:640 state:D stack:0 pid:5390 tgid:5390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebabdd84 r8:00000002 r7:60000113 r6:ebabdd8c r5:849cbc00 r4:849cbc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cbc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebabde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85661500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb19000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f8f8c r4:856f8c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f8f8c r4:85640b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cbc00 r8:85640b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85640b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85640b00 r8:8027f5e8 r7:ebaa5e60 r6:854e8580 r5:849cbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebabdfb0 to 0xebabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85647680 INFO: task kworker/1:640:5390 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 871e7000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:641:5392 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:641 state:D stack:0 pid:5392 tgid:5392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba61d84 r8:00000002 r7:60000113 r6:eba61d8c r5:849cec00 r4:849cec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba61e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85661000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f8b8c r4:856f8800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f8b8c r4:85640a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cec00 r8:85640a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85640a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85640a00 r8:8027f5e8 r7:ebabde60 r6:854e8500 r5:849cec00 r4:00000001 Exception stack(0xeba61fb0 to 0xeba61ff8) r4:85647c80 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:642:5394 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:642 state:D stack:0 pid:5394 tgid:5394 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebad1d84 r8:00000002 r7:60000113 r6:ebad1d8c r5:849ce000 r4:849ce000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ce000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85661140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f938c r4:856f9000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f938c r4:85640b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ce000 r8:85640bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85640b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85640b80 r8:8027f5e8 r7:ebabde60 r6:854e8680 r5:849ce000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad1fb0 to 0xebad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85661180 INFO: task kworker/1:642:5394 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 874f5000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eb8f5d84 r8:00000002 r7:60000113 r6:eb8f5d8c r5:8561e000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85661740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8561e000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f978c r4:856f9400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f978c r4:85640c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561e000 r8:85640cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85640c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85640c80 r8:8027f5e8 r7:ebabde60 r6:854e8600 r5:8561e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f5fb0 to 0xeb8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85661180 INFO: task kworker/1:643:5396 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829188dc r9:ebaddd84 r8:00000002 r7:60000113 r6:ebaddd8c r5:84a90000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e061f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7de40 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae5e08 r5:00001000 r4:eb4e5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:856fc78c r4:85640d80 r4:85640d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85640d80 r8:8027f5e8 r7:eb8f5e60 r6:854e8780 r5:84a91800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae5fb0 to 0xebae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856614c0 INFO: task kworker/1:645:5400 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 87970000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a90c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaede08 r5:00001000 r4:eaae7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:85c39b8c r4:85c39800 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:84a7de40 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabeb000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856fa78c r4:856fa400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856fa78c r4:85640e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a93c00 r8:85640eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85640e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85640e80 r8:8027f5e8 r7:ebae5e60 r6:854e8880 r5:84a93c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf5fb0 to 0xebaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856614c0 INFO: task kworker/1:647:5404 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 87e9f000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829188dc r9:ebaf9d84 r8:00000002 r7:60000013 r6:ebaf9d8c r5:84a92400 r4:84a92400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a92400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85661b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a92400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856fa38c r4:856fa000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856fa38c r4:85640c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a92400 r8:85640c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85640c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85640c00 r8:8027f5e8 r7:ebae5e60 r6:854e8900 r5:84a92400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf9fb0 to 0xebaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85661980 INFO: task kworker/1:648:5406 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 Exception stack(0xe05e5d28 to 0xe05e5d70) r4:e05e5dc0 r5:00001000 r4:ecf01000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f3000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:856fab8c r4:85640f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a95400 r8:85640f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85640f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85640f00 r8:8027f5e8 r7:ebae5e60 r6:854e8980 r5:84a95400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb01fb0 to 0xebb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85661a00 INFO: task kworker/1:649:5408 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 8843c000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:650:5410 blocked for more than 470 seconds. r4:84a96c00 r4:00000000 r4:00000000 r5:00001000 r4:eb173000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856faf8c r4:856fac00 r10:61c88647 r9:84a96c00 r8:8566712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d20: 8843c000 ecf0d000 00000001 80239b98 7f15d000 00000001 r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 INFO: task kworker/1:651:5412 blocked for more than 470 seconds. r4:84a96000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb11e08 r5:00001000 r4:eb293000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a96000 r8:8566702c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85661b00 Call trace: Exception stack(0xe05e5d28 to 0xe05e5d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:85c39b8c r4:85c39800 r4:846ded80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:652 state:D stack:0 pid:5414 tgid:5414 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb19e08 r5:00001000 r4:eb2d7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856fb78c r4:856fb400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856fb78c r4:85667180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a94800 r8:856671ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85667180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85667180 r8:8027f5e8 r7:ebae5e60 r6:854e8b00 r5:84a94800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb19fb0 to 0xebb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85661a80 INFO: task kworker/1:652:5414 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 88b35000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:653:5416 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb353000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a93000 r8:8566732c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:654:5418 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:654 state:D stack:0 pid:5418 tgid:5418 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb29d84 r8:00000002 r7:60000113 r6:ebb29d8c r5:85548000 r4:85548000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85548000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb29e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85661c00 r5:00001000 r4:eb3d9000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 r5:00001000 r4:ecf01000 r4:00000001 INFO: task kworker/1:655:5420 blocked for more than 470 seconds. r4:00000000 r5:00001000 r4:eb3fb000 r5:856fc38c r4:856fc000 Exception stack(0xebb31fb0 to 0xebb31ff8) Call trace: r5:80000013 r4:80239bb0 r5:00001000 r4:ecf01000 r4:846ded80 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:656:5422 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:656 state:D stack:0 pid:5422 tgid:5422 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb39d84 r8:00000002 r7:60000013 r6:ebb39d8c r5:85548c00 r4:85548c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85548c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb39e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85731300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85548c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb521000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856fcb8c r4:856fc800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856fcb8c r4:85667380 r10:00000000 r9:85667380 r8:8027f5e8 r7:ebae5e60 r6:854e8d00 r5:85548c00 r4:00000000 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r10:829188dc r9:ebb35d84 r8:00000002 r7:60000113 r6:ebb35d8c r5:8554b000 r5:00001000 r4:eb721000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856fe38c r4:856fe000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856fe38c r4:85667400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8554b000 r8:8566742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85667400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85667400 r8:8027f5e8 r7:ebb39e60 r6:854e8d80 r5:8554b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb35fb0 to 0xebb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857310c0 INFO: task kworker/1:657:5425 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:658:5428 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:658 state:D stack:0 pid:5428 tgid:5428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb3dd84 r8:00000002 r7:60000013 r6:ebb3dd8c r5:8554bc00 r4:8554bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8554bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb3de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85731540 r5:00001000 r4:eb69f000 r10:61c88647 r9:8554bc00 r8:856674ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:485 state:D stack:0 pid:5429 tgid:5429 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb9b7000 r5:8534838c r4:85348000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 89893000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:84a7de40 r10:829188dc r9:ebb45d84 r8:00000002 r7:60000013 r6:ebb45d8c r5:8554d400 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85731680 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8554d400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6c1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856fd78c r4:856fd400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856fd78c r4:85667500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8554d400 r8:8566752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85667500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85667500 r8:8027f5e8 r7:ebb35e60 r6:854e8f80 r5:8554d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb45fb0 to 0xebb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85731580 INFO: task kworker/1:659:5431 is blocked on a mutex likely owned by task kworker/1:153:3802. Workqueue: events bpf_prog_free_deferred 5d20: 89d0a000 ecf0d000 00000001 80239b98 7f15d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:660:5433 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb6db000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8554e000 r8:8566762c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85731740 Call trace: 5d20: 89d0a000 ecf0d000 00000001 80239b98 7f15d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7de40 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb4de08 r5:00001000 r4:eb6f3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8554ec00 r8:856676ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85731800 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:662:5437 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:662 state:D stack:0 pid:5437 tgid:5437 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb51d84 r8:00000002 r7:60000013 r6:ebb51d8c r5:8554a400 r4:8554a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8554a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb51e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85731e40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8554a400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb885000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856fef8c r4:856fec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856fef8c r4:85667280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8554a400 r8:856672ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85667280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85667280 r8:8027f5e8 r7:ebb35e60 r6:85733100 r5:8554a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb51fb0 to 0xebb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb743000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:856fe78c r4:85667700 5fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:84378000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84378000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb5de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85731c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84378000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb75b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856fcf8c r4:856fcc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856fcf8c r4:85667780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84378000 r8:856677ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85667780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85667780 r8:8027f5e8 r7:ebb51e60 r6:85733200 r5:84378000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb5dfb0 to 0xebb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85731ac0 INFO: task kworker/1:664:5442 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 8a8fe000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85c39b8c r4:85c39800 r4:846ded80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84379800 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb8dd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84379800 r8:856675ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85731d80 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829188dc r9:ebb69d84 r8:00000002 r7:60000113 r6:ebb69d8c r5:8437a400 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb89d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8437a400 r8:856678ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85667880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85667880 r8:8027f5e8 r7:ebb65e60 r6:85733300 r5:8437a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb69fb0 to 0xebb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85731d80 INFO: task kworker/1:666:5445 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 8b0cc000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:667:5447 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb8ad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8437bc00 r8:8566782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85731f40 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:85c39b8c r4:85c39800 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 INFO: task kworker/1:668:5449 blocked for more than 470 seconds. r5:8437c800 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb8bd000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80000013 r4:80239bb0 r4:e05e5dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:669:5451 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:669 state:D stack:0 pid:5451 tgid:5451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb7dd84 r8:00000002 r7:60000113 r6:ebb7dd8c r5:8437b000 r4:8437b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8437b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb7de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85736000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8437b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856ffb8c r4:856ff800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ffb8c r4:85667980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8437b000 r8:856679ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85667980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85667980 r8:8027f5e8 r7:ebb65e60 r6:85733480 r5:8437b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb7dfb0 to 0xebb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85731fc0 INFO: task kworker/1:669:5451 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 8b46e000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84a7de40 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb5f3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8570cb8c r4:85667a80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 8baa5000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:671:5455 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:671 state:D stack:0 pid:5455 tgid:5455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb8dd84 r8:00000002 r7:60000113 r6:ebb8dd8c r5:8437d400 r4:8437d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8437d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb8de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857363c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8437d400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8ed000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570038c r4:85700000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570038c r4:85667b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 Exception stack(0xebb8dfb0 to 0xebb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857362c0 INFO: task kworker/1:671:5455 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 8baa5000 ecf0d000 00000001 80239b98 7f15d000 00000001 r5:80000013 r4:80239bb0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r4:84a7de40 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85700b8c r4:85700800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:674:5461 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:674 state:D stack:0 pid:5461 tgid:5461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:856b0c00 r4:829188d8 r9:83018205 r8:856b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 r5:00001000 r4:eb947000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85736600 Exception stack(0xe05e5d28 to 0xe05e5d70) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbb5d84 r8:00000002 r7:60000113 r6:ebbb5d8c r5:856b1800 r4:856b1800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b1800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85736a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb969000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570178c r4:85701400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570178c r4:85667d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b1800 r8:85667dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85667d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85667d80 r8:8027f5e8 r7:ebb85e60 r6:85733800 r5:856b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb5fb0 to 0xebbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:846ded80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:677:5467 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:677 state:D stack:0 pid:5467 tgid:5467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbbdd84 r8:00000002 r7:60000113 r6:ebbbdd8c r5:856b2400 r4:856b2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b2400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbbde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85736b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb977000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85667d00 r8:8027f5e8 r7:ebb85e60 r6:85733880 r5:856b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbbdfb0 to 0xebbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85736880 INFO: task kworker/1:677:5467 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc5e08 r5:00001000 r4:eb987000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85701f8c r4:85667e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b3000 r8:85667eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85667e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85667e80 r8:8027f5e8 r7:ebb85e60 r6:85733900 r5:856b3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc5fb0 to 0xebbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85736b80 INFO: task kworker/1:678:5469 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 8ce27000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:856b3c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbcde08 r5:00001000 r4:eb995000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8570238c r4:85667f00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:680:5473 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:680 state:D stack:0 pid:5473 tgid:5473 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbddd84 r8:00000002 r7:60000113 r6:ebbddd8c r5:856b4800 r4:856b4800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b4800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb9a7000 r7:ddde2d80 r6:83018200 r5:8570278c r4:85667f80 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e083b000 r7:ddde2d80 r6:83018200 r5:85702b8c r4:85667e00 r4:85736f40 Exception stack(0xe05e5d28 to 0xe05e5d70) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 5fa0: 00000000 00000000 00000000 00000000 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:682:5479 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:682 state:D stack:0 pid:5479 tgid:5479 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbd1d84 r8:00000002 r7:60000113 r6:ebbd1d8c r5:856b6c00 r4:856b6c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b6c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ead8b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8568d100 r8:8027f5e8 r7:ebb85e60 r6:85733b00 r5:856b6c00 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 5fa0: 00000000 00000000 00000000 00000000 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb413000 r4:85733b80 r4:8499ffc0 Exception stack(0xe05e5d28 to 0xe05e5d70) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 5fa0: 00000000 00000000 00000000 00000000 r5:8567c800 r4:829188d8 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8570378c r4:85703400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570378c r4:8568d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8567c800 r8:8568d02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8568d000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8568d000 r8:8027f5e8 r7:ebb85e60 r6:8568d180 r5:8567c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb75fb0 to 0xebb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568a0c0 INFO: task kworker/1:683:5482 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 8e1ec000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:684 state:D stack:0 pid:5484 tgid:5484 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eb017000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8567e000 r8:8568d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8568d080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8568d080 r8:8027f5e8 r7:ebb85e60 r6:8568d280 r5:8567e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba7dfb0 to 0xeba7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8568a300 INFO: task kworker/1:684:5484 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 8e1ec000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 INFO: task kworker/1:685:5486 blocked for more than 470 seconds. [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:e05e5dc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:686:5488 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:686 state:D stack:0 pid:5488 tgid:5488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba65d84 r8:00000002 r7:60000013 r6:eba65d8c r5:8567b000 r4:8567b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8567b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba65e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568a800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8567b000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85703f8c r4:85703c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e05e5dc0 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb227000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570c78c r4:8570c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570c78c r4:8568d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8567d400 r8:8568d42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8568d400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8568d400 r8:8027f5e8 r7:ebb85e60 r6:8568d500 r5:8567d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa1fb0 to 0xebaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:00000000 r9:8568d580 r8:8027f5e8 r7:ebb85e60 r6:8568d680 r5:8567a400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab9e08 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569a080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85679800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb689000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570db8c r4:8570d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570db8c r4:8568d600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85679800 r8:8568d62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8568d600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8568d600 r8:8027f5e8 r7:ebb85e60 r6:8568d780 r5:85679800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab9fb0 to 0xebab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8568abc0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d28 to 0xe05e5d70) 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r5:8567bc00 r4:829188d8 r5:00001000 r4:eb62f000 r7:ddde2d80 r6:83018200 r5:8570d38c r4:8568d700 Exception stack(0xe05e5d28 to 0xe05e5d70) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856c0000 r5:856c0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebacde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568afc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb669000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570cf8c r4:8570cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570cf8c r4:8568d800 r10:61c88647 r9:856c0000 r8:8568d82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r5:85c39b8c r4:85c39800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569a700 r5:00001000 r4:eb7af000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570e78c r4:8570e400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:856c0c00 r8:8568d9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8568d980 r8:8027f5e8 r7:ebab9e60 r6:8568db00 r5:856c0c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:82ac11e4 r4:e05e5dc0 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:693:5502 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:693 state:D stack:0 pid:5502 tgid:5502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbe5d84 r8:00000002 r7:60000113 r6:ebbe5d8c r5:856c1800 r4:856c1800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856c1800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569a300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570df8c r4:8570dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570df8c r4:8568da80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856c1800 r8:8568daac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8568da80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8568da80 r8:8027f5e8 r7:ebad9e60 r6:8568da00 r5:856c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbe5fb0 to 0xebbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569a2c0 INFO: task kworker/1:693:5502 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 8f8fa000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:694:5505 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:694 state:D stack:0 pid:5505 tgid:5505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbe9d84 r8:00000002 r7:60000013 r6:ebbe9d8c r5:856c2400 r4:856c2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856c2400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569a4c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb78f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570d78c r4:8570d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570d78c r4:8568db80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856c2400 r8:8568dbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8568db80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8568db80 r8:8027f5e8 r7:ebad9e60 r6:8568dc80 r5:856c2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbe9fb0 to 0xebbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569a340 INFO: task kworker/1:694:5505 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 8fecc000 ecf0d000 00000001 80239b98 7f15d000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:695 state:D stack:0 pid:5507 tgid:5507 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbf5d84 r8:00000002 r7:60000113 r6:ebbf5d8c r5:856c3000 r4:856c3000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856c3000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569aac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7ff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570ef8c r4:8570ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570ef8c r4:8568dc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856c3000 r8:8568dc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8568dc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8568dc00 r8:8027f5e8 r7:ebad9e60 r6:8568dd80 r5:856c3000 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a7de40 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:eb7c9000 r10:61c88647 r9:856c3c00 r8:8568deac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:697 state:D stack:0 pid:5510 tgid:5510 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569a900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7df000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570e38c r4:8570e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570e38c r4:8568dd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856c4800 r8:8568dd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8568dd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8568dd00 r8:8027f5e8 r7:ebbf5e60 r6:8568df00 r5:856c4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbf9fb0 to 0xebbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569a140 INFO: task kworker/1:697:5510 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 904c0000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r4:856c5400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856c5400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbfde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569a8c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb811000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570f78c r4:8570f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570f78c r4:8568df80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856c5400 r8:8568dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8568df80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8568df80 r8:8027f5e8 r7:ebbf5e60 r6:8523bf80 r5:856c5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbfdfb0 to 0xebbfdff8) r4:8569a940 r4:00000000 r4:82ac11e4 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829188dc r9:ebc05d84 r8:00000002 r7:60000113 r6:ebc05d8c r5:856c6000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc05e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856af600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85714f8c r4:85714c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85714f8c r4:856ab100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856c6000 r8:856ab12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ab100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ab100 r8:8027f5e8 r7:ebbfde60 r6:856ab080 r5:856c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc05fb0 to 0xebc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569ac40 INFO: task kworker/1:699:5515 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 90b48000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/1:700:5516 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:700 state:D stack:0 pid:5516 tgid:5516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc01d84 r8:00000002 r7:60000113 r6:ebc01d8c r5:856c6c00 r4:856c6c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856c6c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc01e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569ad80 r5:00001000 r4:eb843000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8570f38c r4:8570f000 r10:61c88647 r9:856c6c00 r8:856ab02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:701:5518 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:701 state:D stack:0 pid:5518 tgid:5518 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc09d84 r8:00000002 r7:60000013 r6:ebc09d8c r5:856c8000 r4:856c8000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856c8000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc09e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569af00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 r5:00001000 r4:eb85b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570fb8c r4:8570f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:856c8000 r8:856ab22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:701:5518 is blocked on a mutex likely owned by task kworker/1:153:3802. r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r4:846ded80 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:702:5520 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:702 state:D stack:0 pid:5520 tgid:5520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc11d84 r8:00000002 r7:60000113 r6:ebc11d8c r5:856c9800 r4:856c9800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856c9800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc11e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85736dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb86f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570ff8c r4:8570fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570ff8c r4:856ab280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856c9800 r8:856ab2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ab280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ab280 r8:8027f5e8 r7:ebc05e60 r6:856ab400 r5:856c9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc11fb0 to 0xebc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569adc0 INFO: task kworker/1:702:5520 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9140a000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:703:5522 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:703 state:D stack:0 pid:5522 tgid:5522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc0dd84 r8:00000002 r7:60000113 r6:ebc0dd8c r5:856ca400 r4:856ca400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ca400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc0de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856af040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb881000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571438c r4:85714000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571438c r4:856ab380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ca400 r8:856ab3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ab380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ab380 r8:8027f5e8 r7:ebc05e60 r6:856ab500 r5:856ca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc0dfb0 to 0xebc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8569ae00 INFO: task kworker/1:703:5522 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 91997000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:704:5524 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:704 state:D stack:0 pid:5524 tgid:5524 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc15d84 r8:00000002 r7:60000113 r6:ebc15d8c r5:856cb000 r4:856cb000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cb000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc15e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856af2c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571478c r4:85714400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571478c r4:856ab480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cb000 r8:856ab4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ab480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ab480 r8:8027f5e8 r7:ebc05e60 r6:856ab600 r5:856cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc15fb0 to 0xebc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856af100 INFO: task kworker/1:704:5524 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 91f8b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Not tainted 6.15.0-syzkaller #0 task:kworker/1:705 state:D stack:0 pid:5526 tgid:5526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc21d84 r8:00000002 r7:60000113 r6:ebc21d8c r5:856cbc00 r4:856cbc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cbc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc21e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856af440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9dd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85714b8c r4:85714800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85714b8c r4:856ab580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cbc00 r8:856ab5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ab580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ab580 r8:8027f5e8 r7:ebc05e60 r6:856ab700 r5:856cbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc21fb0 to 0xebc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856af200 INFO: task kworker/1:705:5526 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 91f8b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:706:5529 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:706 state:D stack:0 pid:5529 tgid:5529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc25d84 r8:00000002 r7:60000013 r6:ebc25d8c r5:856cc800 r4:856cc800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cc800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc25e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856af780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba07000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571578c r4:85715400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571578c r4:856ab680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cc800 r8:856ab6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ab680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ab680 r8:8027f5e8 r7:ebc05e60 r6:856ab780 r5:856cc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc25fb0 to 0xebc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856af340 INFO: task kworker/1:706:5529 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 92332000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:707:5530 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:707 state:D stack:0 pid:5530 tgid:5530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc29d84 r8:00000002 r7:60000113 r6:ebc29d8c r5:856cd400 r4:856cd400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cd400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc29e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856af900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba17000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571538c r4:85715000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571538c r4:856ab880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cd400 r8:856ab8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ab880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ab880 r8:8027f5e8 r7:ebc25e60 r6:856ab980 r5:856cd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc29fb0 to 0xebc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856af640 INFO: task kworker/1:707:5530 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 92332000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:708:5533 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:708 state:D stack:0 pid:5533 tgid:5533 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc2dd84 r8:00000002 r7:60000013 r6:ebc2dd8c r5:856ce000 r4:856ce000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ce000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc2de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856afd80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85715b8c r4:85715800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85715b8c r4:856ab800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ce000 r8:856ab82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856ab800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ab800 r8:8027f5e8 r7:ebc29e60 r6:856ab900 r5:856ce000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc2dfb0 to 0xebc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856af740 INFO: task kworker/1:708:5533 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 92712000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:709:5535 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:709 state:D stack:0 pid:5535 tgid:5535 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc35d84 r8:00000002 r7:60000113 r6:ebc35d8c r5:856cec00 r4:856cec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc35e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856afa80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba69000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85715f8c r4:85715c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85715f8c r4:856aba00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cec00 r8:856aba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856aba00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856aba00 r8:8027f5e8 r7:ebc2de60 r6:856abb80 r5:856cec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc35fb0 to 0xebc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856af9c0 INFO: task kworker/1:709:5535 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 92712000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 Exception stack(0xe05e5fb0 to 0xe05e5ff8) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba8d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8571638c r4:856abb00 Exception stack(0xebc31fb0 to 0xebc31ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:711:5539 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:711 state:D stack:0 pid:5539 tgid:5539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc39d84 r8:00000002 r7:60000113 r6:ebc39d8c r5:856d0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc39e08 r9:83018205 r8:856d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 r5:00001000 r4:ebc49000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571678c r4:856aba80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856d0000 r8:856abaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856aba80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856aba80 r8:8027f5e8 r7:ebc2de60 r6:856abd80 r5:856d0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc39fb0 to 0xebc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856af6c0 INFO: task kworker/1:711:5539 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 92b5d000 ecf0d000 00000001 80239b98 7f15d000 00000001 r4:82ac11e4 r5:85c39b8c r4:85c39800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:85716b8c r4:85716800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:713:5543 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:713 state:D stack:0 pid:5543 tgid:5543 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc41d84 r8:00000002 r7:60000113 r6:ebc41d8c r5:856d1800 r4:856d1800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856d1800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc41e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577d1c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571778c r4:85717400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571778c r4:856abd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856d1800 r8:856abd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856abd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856abd00 r8:8027f5e8 r7:ebc39e60 r6:856abf00 r5:856d1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc41fb0 to 0xebc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856affc0 INFO: task kworker/1:713:5543 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:856d2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856d2400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc45e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577d0c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc55000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:856abe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856abe80 r8:8027f5e8 r7:ebc41e60 r6:856abf80 r5:856d2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc45fb0 to 0xebc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8577d080 INFO: task kworker/1:714:5544 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r5:85c39b8c r4:85c39800 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 task:kworker/1:715 state:D stack:0 pid:5547 tgid:5547 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfb25000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:716:5548 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:716 state:D stack:0 pid:5548 tgid:5548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbc9d84 r8:00000002 r7:60000113 r6:ebbc9d8c r5:856d3c00 r4:856d3c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856d3c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8577d800 r5:00001000 r4:eabe1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85780000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 93a5e000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc5de08 r5:00001000 r4:eaa57000 r7:ddde2d80 r6:83018200 r5:85717b8c r4:85780180 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/1:718 state:D stack:0 pid:5553 tgid:5553 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb25d000 r10:61c88647 r9:856d5400 r8:8578032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85780300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85780300 r8:8027f5e8 r7:ebbc9e60 r6:85780380 r5:856d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc61fb0 to 0xebc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8577d740 INFO: task kworker/1:718:5553 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 94608000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05e5fb0 to 0xe05e5ff8) task:kworker/1:719 state:D stack:0 pid:5554 tgid:5554 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eaec3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 r5:85c39b8c r4:85c39800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a7de40 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f7000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:721:5559 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:721 state:D stack:0 pid:5559 tgid:5559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec485d84 r8:00000002 r7:60000113 r6:ec485d8c r5:8480c800 r4:8480c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8480c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec485e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb2d9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85780580 r4:8577db40 Exception stack(0xe05e5d28 to 0xe05e5d70) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:722:5561 blocked for more than 471 seconds. r10:829188dc r9:ec499d84 r8:00000002 r7:60000113 r6:ec499d8c r5:8480b000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb3c7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8480b000 r8:8578052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8577dc00 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:723:5563 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:723 state:D stack:0 pid:5563 tgid:5563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec4a1d84 r8:00000002 r7:60000113 r6:ec4a1d8c r5:8480bc00 r4:8480bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8480bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb4f9000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4a9e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85780600 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9561a000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4b1e08 r5:00001000 r4:eb54d000 r10:00000000 r9:85780780 r8:8027f5e8 r7:ec4a1e60 r6:85733f80 r5:8480e000 r4:8577d300 INFO: task kworker/1:725:5567 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 95ae2000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4b9e08 r9:83018205 r8:8480ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8ab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572438c r4:85724000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8572438c r4:85780700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8480ec00 r8:8578072c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85780700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85780700 r8:8027f5e8 r7:ec4b1e60 r6:8579d000 r5:8480ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4b9fb0 to 0xec4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8499fcc0 INFO: task kworker/1:726:5569 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8480a400 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8480a400 r8:857808ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:728:5573 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:728 state:D stack:0 pid:5573 tgid:5573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec4c9d84 r8:00000002 r7:60000113 r6:ec4c9d8c r5:84808c00 r4:84808c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84808c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb6cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8572278c r4:85780900 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a7de40 r5:84788c00 r4:829188d8 r5:00001000 r4:eb6eb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8572338c r4:85780800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:730:5577 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:730 state:D stack:0 pid:5577 tgid:5577 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec4d5d84 r8:00000002 r7:60000113 r6:ec4d5d8c r5:84789800 r4:84789800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84789800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4d5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857977c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84789800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb71d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572378c r4:85723400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8572378c r4:85780a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84789800 r8:85780a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85780a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85780a00 r8:8027f5e8 r7:ec4b9e60 r6:8579d200 r5:84789800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4d5fb0 to 0xec4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857971c0 INFO: task kworker/1:730:5577 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ec4e5d84 r8:00000002 r7:60000113 r6:ec4e5d8c r5:8478b000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb73d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85780980 Exception stack(0xec4e5fb0 to 0xec4e5ff8) INFO: task kworker/1:731:5579 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 96e87000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:829188dc r9:ec4edd84 r8:00000002 r7:60000013 r6:ec4edd8c r5:8478c800 r5:00001000 r4:eb75d000 r7:ddde2d80 r6:83018200 r5:85722f8c r4:85780b00 r4:85797900 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4f5e08 r5:00001000 r4:eb895000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85723f8c r4:85723c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85723f8c r4:85780b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8478bc00 r8:85780bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85780b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85780b80 r8:8027f5e8 r7:ec4b9e60 r6:8579d380 r5:8478bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4f5fb0 to 0xec4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85797540 INFO: task kworker/1:733:5583 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 97548000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4f9e08 r5:00001000 r4:eb96b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:e05e5dc0 r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r5:8478d400 r4:829188d8 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85797d00 r5:00001000 r4:eb8c3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8478d400 r8:85780aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85797880 Workqueue: events bpf_prog_free_deferred 5d20: 97c25000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r5:8478e000 r4:829188d8 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb8d5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:737 state:D stack:0 pid:5591 tgid:5591 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec50dd84 r8:00000002 r7:60000113 r6:ec50dd8c r5:8478ec00 r4:8478ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8478ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec50de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85797640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8478ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8eb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85724b8c r4:85724800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85724b8c r4:85780d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8478ec00 r8:85780dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85780d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85780d80 r8:8027f5e8 r7:ec4f9e60 r6:8579d580 r5:8478ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec50dfb0 to 0xec50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85797e40 INFO: task kworker/1:737:5591 is blocked on a mutex likely owned by task kworker/1:153:3802. Exception stack(0xe05e5d28 to 0xe05e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb917000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572578c r4:85725400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8572578c r4:85780e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8437ec00 r8:85780e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85780e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85780e00 r8:8027f5e8 r7:ec4f9e60 r6:8579d600 r5:8437ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec515fb0 to 0xec515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85797f40 INFO: task kworker/1:738:5593 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 98691000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:739:5595 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:739 state:D stack:0 pid:5595 tgid:5595 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec51dd84 r8:00000002 r7:60000013 r6:ec51dd8c r5:84770c00 r4:84770c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84770c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb943000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r7:ddde2d80 r6:83018200 r5:85725b8c r4:85780f00 r4:857cb2c0 INFO: task kworker/1:740:5597 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 98acc000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7de40 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84773000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 r5:00001000 r4:eb777000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85780d00 r8:8027f5e8 r7:ec4f9e60 r6:8579d780 r5:84773000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec52dfb0 to 0xec52dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857cb580 INFO: task kworker/1:741:5599 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 98acc000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 task:kworker/1:742 state:D stack:0 pid:5601 tgid:5601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec535d84 r8:00000002 r7:60000013 r6:ec535d8c r5:84772400 r4:84772400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84772400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec535e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cb6c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84772400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb3d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85725f8c r4:85725c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85725f8c r4:857d5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84772400 r8:857d502c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5000 r8:8027f5e8 r7:ec52de60 r6:8579d800 r5:84772400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec535fb0 to 0xec535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857cb600 INFO: task kworker/1:742:5601 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7de40 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08a5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85726b8c r4:85726800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85726b8c r4:857d5100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84771800 r8:857d512c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5100 r8:8027f5e8 r7:ec52de60 r6:8579d880 r5:84771800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec53dfb0 to 0xec53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857cb400 INFO: task kworker/1:743:5603 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9936c000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:846ded80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:84773c00 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018205 r8:84773c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r5:00001000 r4:eadf3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:8572678c r4:857d5180 r4:857d5180 r10:00000000 r9:857d5180 r8:8027f5e8 r7:ec52de60 r6:8579d900 r5:84773c00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 5d20: 9997f000 ecf0d000 00000001 80239b98 7f15d000 00000001 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r5:00001000 r4:ecf01000 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:745:5607 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:745 state:D stack:0 pid:5607 tgid:5607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec54dd84 r8:00000002 r7:60000113 r6:ec54dd8c r5:84774800 r4:84774800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84774800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec54de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cba40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84774800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf7b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85726f8c r4:85726c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85726f8c r4:857d5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84774800 r8:857d50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5080 r8:8027f5e8 r7:ec52de60 r6:8579d980 r5:84774800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec54dfb0 to 0xec54dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857cb980 INFO: task kworker/1:745:5607 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 99d63000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 r4:84a7de40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r4:84775400 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb0ef000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8572778c r4:857d5280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84775400 r8:857d52ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5280 r8:8027f5e8 r7:ec52de60 r6:8579da00 r5:84775400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec555fb0 to 0xec555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857cba80 INFO: task kworker/1:746:5609 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9a235000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:747:5611 blocked for more than 472 seconds. [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cbcc0 r5:00001000 r4:eb1d9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e5d28 to 0xe05e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cbe80 r5:00001000 r4:eb587000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:749 state:D stack:0 pid:5615 tgid:5615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec571d84 r8:00000002 r7:60000113 r6:ec571d8c r5:85748c00 r4:85748c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85748c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec571e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857cbf40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85748c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85727f8c r4:85727c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85727f8c r4:857d5200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85748c00 r8:857d522c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5200 r8:8027f5e8 r7:ec52de60 r6:8579db80 r5:85748c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec571fb0 to 0xec571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857cbec0 INFO: task kworker/1:749:5615 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9addb000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:85748000 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:85748000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 r5:00001000 r4:eb63f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8572838c r4:857d5400 9fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 r4:846ded80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec581e08 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85749800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb67f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572878c r4:85728400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8572878c r4:857d5500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85749800 r8:857d552c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5500 r8:8027f5e8 r7:ec52de60 r6:8579dc80 r5:85749800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec581fb0 to 0xec581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85789080 INFO: task kworker/1:751:5619 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9b3cb000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:752:5621 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:752 state:D stack:0 pid:5621 tgid:5621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec589d84 r8:00000002 r7:60000113 r6:ec589d8c r5:8574a400 r4:8574a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8574a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec589e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8574a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572938c r4:85729000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8572938c r4:857d5580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574a400 r8:857d55ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5580 r8:8027f5e8 r7:ec52de60 r6:8579dd00 r5:8574a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec589fb0 to 0xec589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857ae040 INFO: task kworker/1:752:5621 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9b6db000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:753:5623 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:753 state:D stack:0 pid:5623 tgid:5623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec59dd84 r8:00000002 r7:60000113 r6:ec59dd8c r5:8574b000 r4:8574b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8574b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec59de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae2c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8574b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb79d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85728f8c r4:85728c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85728f8c r4:857d5480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574b000 r8:857d54ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5480 r8:8027f5e8 r7:ec589e60 r6:8579dd80 r5:8574b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e5d28 to 0xe05e5d70) r4:82ac11e4 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7de40 task:kworker/1:754 state:D stack:0 pid:5625 tgid:5625 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eb87b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:857d5680 5fa0: 00000000 00000000 00000000 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:755:5627 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:755 state:D stack:0 pid:5627 tgid:5627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec5add84 r8:00000002 r7:60000113 r6:ec5add8c r5:8574c800 r4:8574c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8574c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5ade08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae5c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8574c800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572978c r4:85729400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8572978c r4:857d5700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574c800 r8:857d572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5700 r8:8027f5e8 r7:ec5a5e60 r6:8579de80 r5:8574c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5adfb0 to 0xec5adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857ae0c0 INFO: task kworker/1:755:5627 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9bbc9000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a7de40 INFO: task kworker/1:756:5629 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:756 state:D stack:0 pid:5629 tgid:5629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec5b5d84 r8:00000002 r7:60000013 r6:ec5b5d8c r5:8574ec00 r4:8574ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8574ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae680 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8574ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb807000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85729b8c r4:85729800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85729b8c r4:857d5780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574ec00 r8:857d57ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5780 r8:8027f5e8 r7:ec5a5e60 r6:8579df00 r5:8574ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5b5fb0 to 0xec5b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857ae600 INFO: task kworker/1:756:5629 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9c37d000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:8574e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5bde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ae840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8574e000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb83b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85729f8c r4:85729c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85729f8c r4:857d5880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574e000 r8:857d58ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5880 r8:8027f5e8 r7:ec5a5e60 r6:8579df80 r5:8574e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5bdfb0 to 0xec5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857ae6c0 INFO: task kworker/1:757:5631 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9c37d000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c5e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:857d5600 r8:8027f5e8 r7:ec5a5e60 r6:8585c000 r5:8574d400 r4:857ae640 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:85c39b8c r4:85c39800 r4:846ded80 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:759:5635 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:759 state:D stack:0 pid:5635 tgid:5635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec5cdd84 r8:00000002 r7:60000113 r6:ec5cdd8c r5:84a98c00 r4:84a98c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a98c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5cde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aeb80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a98c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb983000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572a78c r4:8572a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8572a78c r4:857d5900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a98c00 r8:857d592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5900 r8:8027f5e8 r7:ec5a5e60 r6:8585c080 r5:84a98c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5cdfb0 to 0xec5cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857ae9c0 INFO: task kworker/1:759:5635 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9cfc3000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:84a7de40 task:kworker/1:760 state:D stack:0 pid:5637 tgid:5637 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb9c3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9a400 r8:857d582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5800 r8:8027f5e8 r7:ec5cde60 r6:8585c100 r5:84a9a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5ddfb0 to 0xec5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857aeb40 INFO: task kworker/1:760:5637 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9cfc3000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:761:5639 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:761 state:D stack:0 pid:5639 tgid:5639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec601d84 r8:00000002 r7:60000013 r6:ec601d8c r5:84a99800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec601e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aecc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a99800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb99b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572af8c r4:8572ac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8572af8c r4:857d5a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a99800 r8:857d5a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5a00 r8:8027f5e8 r7:ec5dde60 r6:8585c180 r5:84a99800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec601fb0 to 0xec601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857aebc0 INFO: task kworker/1:761:5639 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9cfc3000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:762:5641 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:762 state:D stack:0 pid:5641 tgid:5641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec60dd84 r8:00000002 r7:60000013 r6:ec60dd8c r5:84a98000 r4:84a98000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a98000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec60de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aee80 r4:00000000 r9:83018205 r8:84a98000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 r5:00001000 r4:eb9ad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:857aed00 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 5d20: 9d3d1000 ecf0d000 00000001 80239b98 7f15d000 00000001 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:00000000 r5:00001000 r4:ecf01000 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:763:5644 blocked for more than 472 seconds. task:kworker/1:763 state:D stack:0 pid:5644 tgid:5644 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:84a9b000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 r5:00001000 r4:eb9d7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8572bb8c r4:8572b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8572bb8c r4:857d5980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9b000 r8:857d59ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5980 r8:8027f5e8 r7:ec5dde60 r6:8585c280 r5:84a9b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec619fb0 to 0xec619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857aeec0 INFO: task kworker/1:763:5644 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9d819000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:764:5646 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:764 state:D stack:0 pid:5646 tgid:5646 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec505d84 r8:00000002 r7:60000113 r6:ec505d8c r5:856d6c00 r4:856d6c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856d6c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec505e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead73000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fe78c r4:858fe400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fe78c r4:857d5b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856d6c00 r8:857d5bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5b80 r8:8027f5e8 r7:ec619e60 r6:857d5c00 r5:856d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec505fb0 to 0xec505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857aebc0 INFO: task kworker/1:764:5646 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9d819000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84a7de40 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec615e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84916000 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e5dc0 r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85797f40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fc38c r4:858fc000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fc38c r4:857d5d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856d8000 r8:857d5d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5d00 r8:8027f5e8 r7:ec505e60 r6:857d5d80 r5:856d8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec61dfb0 to 0xec61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857aebc0 INFO: task kworker/1:766:5650 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9dd5d000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:767:5651 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:767 state:D stack:0 pid:5651 tgid:5651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec629d84 r8:00000002 r7:60000113 r6:ec629d8c r5:84a9c800 r4:84a9c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a9c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba13000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858fcb8c r4:857d5e00 r10:61c88647 r9:84a9c800 r8:857d5e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9dd5d000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:768:5653 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:768 state:D stack:0 pid:5653 tgid:5653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec631d84 r8:00000002 r7:60000113 r6:ec631d8c r5:84a9bc00 r4:84a9bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a9bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec631e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a9bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba7f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fc78c r4:858fc400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fc78c r4:857d5e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9bc00 r8:857d5eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5e80 r8:8027f5e8 r7:ec505e60 r6:8585c380 r5:84a9bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec631fb0 to 0xec631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85889080 INFO: task kworker/1:768:5653 is blocked on a mutex likely owned by task kworker/1:153:3802. r4:00000000 5d20: 9e94c000 ecf0d000 00000001 80239b98 7f15d000 00000001 r4:00000000 r5:85c39b8c r4:85c39800 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Not tainted 6.15.0-syzkaller #0 r4:84a9e000 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec635e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a9e000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fd38c r4:858fd000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fd38c r4:857d5f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9e000 r8:857d5fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:857d5f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d5f80 r8:8027f5e8 r7:ec505e60 r6:8585c400 r5:84a9e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec635fb0 to 0xec635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85889500 INFO: task kworker/1:769:5655 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9e94c000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ebac3000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e5d28 to 0xe05e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a9ec00 r4:00000000 r4:00000000 r5:00001000 r4:ebae1000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fd78c r4:858fd400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fd78c r4:8588d100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9ec00 r8:8588d12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d100 r8:8027f5e8 r7:ec505e60 r6:8585c500 r5:84a9ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec645fb0 to 0xec645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85889680 INFO: task kworker/1:771:5659 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9f2bb000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:772:5661 blocked for more than 472 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018205 r8:85760c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r5:00001000 r4:ebaf1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fdf8c r4:858fdc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8588d000 dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 r4:846ded80 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:773:5663 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:773 state:D stack:0 pid:5663 tgid:5663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec655d84 r8:00000002 r7:60000113 r6:ec655d8c r5:85760000 r4:85760000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85760000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec655e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85760000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb05000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fdb8c r4:858fd800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fdb8c r4:8588d180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85760000 r8:8588d1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d180 r8:8027f5e8 r7:ec505e60 r6:8585c600 r5:85760000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec655fb0 to 0xec655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85889a00 INFO: task kworker/1:773:5663 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9f7b4000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:774:5665 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:774 state:D stack:0 pid:5665 tgid:5665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec65dd84 r8:00000002 r7:60000113 r6:ec65dd8c r5:85761800 r4:85761800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85761800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec65de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85761800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb31000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fe38c r4:858fe000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fe38c r4:8588d280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85761800 r8:8588d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d280 r8:8027f5e8 r7:ec505e60 r6:8585c680 r5:85761800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec65dfb0 to 0xec65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858899c0 INFO: task kworker/1:774:5665 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9f7b4000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:775:5667 blocked for more than 472 seconds. Workqueue: events bpf_prog_free_deferred r4:85762400 r5:85762400 r4:829188d8 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec671e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889f80 r5:00001000 r4:eb2b9000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:776 state:D stack:0 pid:5671 tgid:5671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec675d84 r8:00000002 r7:60000113 r6:ec675d8c r5:85764800 r4:85764800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85764800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec675e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889e40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85764800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb171000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fef8c r4:858fec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fef8c r4:8588d300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85764800 r8:8588d32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d300 r8:8027f5e8 r7:ec671e60 r6:8585c780 r5:85764800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec675fb0 to 0xec675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85889e80 INFO: task kworker/1:776:5671 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: 9fdcc000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:777:5673 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:777 state:D stack:0 pid:5673 tgid:5673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec67dd84 r8:00000002 r7:60000113 r6:ec67dd8c r5:85766000 r4:85766000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85766000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec67de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589d3c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85766000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6e3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a038c r4:858a0000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a038c r4:8588d200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85766000 r8:8588d22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d200 r8:8027f5e8 r7:ec671e60 r6:8585c800 r5:85766000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec67dfb0 to 0xec67dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85889b00 INFO: task kworker/1:777:5673 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a0499000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018205 r8:85765400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 r5:00001000 r4:eb36d000 r5:858ff38c r4:858ff000 r4:8588d380 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7de40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:779 state:D stack:0 pid:5676 tgid:5676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec689d84 r8:00000002 r7:60000113 r6:ec689d8c r5:85766c00 r4:85766c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85766c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec689e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858896c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85766c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858ff78c r4:858ff400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ff78c r4:8588d480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85766c00 r8:8588d4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d480 r8:8027f5e8 r7:ec67de60 r6:8585c900 r5:85766c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec689fb0 to 0xec689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857bd780 INFO: task kworker/1:779:5676 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a0aeb000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:85763c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec691e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5e7000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:780:5681 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:780 state:D stack:0 pid:5681 tgid:5681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec6a9d84 r8:00000002 r7:60000113 r6:ec6a9d8c r5:84788000 r4:84788000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84788000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589d000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84788000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb54b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858fff8c r4:858ffc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858fff8c r4:8588d500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84788000 r8:8588d52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d500 r8:8027f5e8 r7:ec67de60 r6:8585ca00 r5:84788000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6a9fb0 to 0xec6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85889d80 INFO: task kworker/1:780:5681 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a0d6b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:781:5683 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:781 state:D stack:0 pid:5683 tgid:5683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec6cdd84 r8:00000002 r7:60000113 r6:ec6cdd8c r5:84828c00 r4:84828c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84828c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6cde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589d280 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84828c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6ab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858ffb8c r4:858ff800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ffb8c r4:8588d580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84828c00 r8:8588d5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d580 r8:8027f5e8 r7:ec67de60 r6:8585cb00 r5:84828c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6cdfb0 to 0xec6cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8589d040 INFO: task kworker/1:781:5683 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:782:5685 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:782 state:D stack:0 pid:5685 tgid:5685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec6d5d84 r8:00000002 r7:60000013 r6:ec6d5d8c r5:84828000 r4:84828000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84828000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589d800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84828000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb945000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a138c r4:858a1000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a138c r4:8588d600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84828000 r8:8588d62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:783:5687 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:783 state:D stack:0 pid:5687 tgid:5687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec6ddd84 r8:00000002 r7:60000113 r6:ec6ddd8c r5:84829800 r4:84829800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84829800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6dde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589d500 r5:00001000 r4:eb71b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a078c r4:858a0400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a078c r4:8588d680 r4:8588d680 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e5d28 to 0xe05e5d70) 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:784:5689 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:784 state:D stack:0 pid:5689 tgid:5689 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec6e5d84 r8:00000002 r7:60000113 r6:ec6e5d8c r5:8482a400 r4:8482a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8482a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589d640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8482a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb74b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a0b8c r4:858a0800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a0b8c r4:8588d700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482a400 r8:8588d72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d700 r8:8027f5e8 r7:ec6d5e60 r6:8585cc80 r5:8482a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e5fb0 to 0xec6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8589d400 INFO: task kworker/1:784:5689 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a1a36000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:84a7de40 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb883000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8482b000 r8:8588d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a26ab000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:786:5693 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:786 state:D stack:0 pid:5693 tgid:5693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec6f1d84 r8:00000002 r7:60000013 r6:ec6f1d8c r5:8482c800 r4:8482c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8482c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8589d980 r5:00001000 r4:eb8a5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:858a178c r4:858a1400 r10:61c88647 r9:8482c800 r8:8588d82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ec6f5d84 r8:00000002 r7:60000013 r6:ec6f5d8c r5:8482d400 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb8c5000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a1b8c r4:858a1800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a1b8c r4:8588d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:8588d42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588d400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588d400 r8:8027f5e8 r7:ec6d5e60 r6:8585ce00 r5:8482d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6f5fb0 to 0xec6f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8589d800 INFO: task kworker/1:787:5695 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a2f13000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f9e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8e3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858a1f8c r4:8588d880 Exception stack(0xec6f9fb0 to 0xec6f9ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 INFO: task kworker/1:789:5699 blocked for more than 472 seconds. r5:8482ec00 r4:829188d8 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb903000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:8589db80 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 r5:00001000 r4:ecf01000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:790:5701 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:790 state:D stack:0 pid:5701 tgid:5701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec705d84 r8:00000002 r7:60000113 r6:ec705d8c r5:85763000 r4:85763000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85763000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec705e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bd780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85763000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb23000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a2f8c r4:858a2c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a2f8c r4:8588da00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85763000 r8:8588da2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588da00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588da00 r8:8027f5e8 r7:ec6d5e60 r6:8585cf80 r5:85763000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec705fb0 to 0xec705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8589ddc0 INFO: task kworker/1:790:5701 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a3680000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ec62dd84 r8:00000002 r7:60000113 r6:ec62dd8c r5:856dbc00 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb95f000 r5:858a278c r4:858a2400 r4:8588da80 Exception stack(0xec62dfb0 to 0xec62dff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:856d9800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec70de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85889080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb13000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a2b8c r4:858a2800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a2b8c r4:8588db00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856d9800 r8:8588db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588db00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588db00 r8:8027f5e8 r7:ec705e60 r6:8588dc00 r5:856d9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec70dfb0 to 0xec70dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8589eec0 INFO: task kworker/1:792:5706 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a3680000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:793:5708 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0a1000 r5:858a838c r4:858a8000 r4:8588db80 Exception stack(0xec711fb0 to 0xec711ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:794:5709 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:794 state:D stack:0 pid:5709 tgid:5709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc69d84 r8:00000002 r7:60000113 r6:ebc69d8c r5:856dd400 r4:856dd400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856dd400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc69e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f0080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb57000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a338c r4:858a3000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a338c r4:8588dc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856dd400 r8:8588dcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588dc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588dc80 r8:8027f5e8 r7:ec711e60 r6:8588dd80 r5:856dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc69fb0 to 0xebc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916200 INFO: task kworker/1:794:5709 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dfb55000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:858a3b8c r4:8588de00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:856dec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec719e08 r5:00001000 r4:eac41000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a378c r4:8588de80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856dec00 r8:8588deac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8588de80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588de80 r8:8027f5e8 r7:ec711e60 r6:8588df80 r5:856dec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec719fb0 to 0xec719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f0200 INFO: task kworker/1:796:5713 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a4380000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:797:5715 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:797 state:D stack:0 pid:5715 tgid:5715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec541d84 r8:00000002 r7:60000113 r6:ec541d8c r5:856db000 r4:856db000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec541e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858a3f8c r4:858f8100 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 5d60: 80230ad4 80239bb0 80000013 ffffffff [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:798:5718 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:798 state:D stack:0 pid:5718 tgid:5718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec71dd84 r8:00000002 r7:60000113 r6:ec71dd8c r5:858d8000 r4:858d8000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d8000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec71de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f0c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a878c r4:858a8400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a878c r4:858f8080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858d8000 r8:858f80ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858f8080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f8080 r8:8027f5e8 r7:ec711e60 r6:852cb000 r5:858d8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec71dfb0 to 0xec71dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:799:5720 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:799 state:D stack:0 pid:5720 tgid:5720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec725d84 r8:00000002 r7:60000113 r6:ec725d8c r5:858d8c00 r4:858d8c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858d8c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec725e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f04c0 r9:83018205 r8:858d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 r5:00001000 r4:eb217000 r5:858a8b8c r4:858a8800 r10:61c88647 r9:858d8c00 r8:858f81ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:858d9800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec729e08 r5:00001000 r4:eb5db000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a8f8c r4:858a8c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a8f8c r4:858f8280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858d9800 r8:858f82ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858f8280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f8280 r8:8027f5e8 r7:ec71de60 r6:852cb100 r5:858d9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec729fb0 to 0xec729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f08c0 INFO: task kworker/1:800:5721 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a4d88000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec731e08 r5:00001000 r4:eb637000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:858da400 r8:858f822c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f08c0 INFO: task kworker/1:801:5723 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a50ed000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858dc800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb7bf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858a9b8c r4:858f8380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec741e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f0d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb789000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a978c r4:858a9400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a978c r4:858f8400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858dbc00 r8:858f842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858f8400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f8400 r8:8027f5e8 r7:ec739e60 r6:852cb280 r5:858dbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec741fb0 to 0xec741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f0ac0 INFO: task kworker/1:803:5727 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a5428000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:858de000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec749e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858aa38c r4:858aa000 r4:858f8480 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05e5d28 to 0xe05e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:805:5731 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:805 state:D stack:0 pid:5731 tgid:5731 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec751d84 r8:00000002 r7:60000113 r6:ec751d8c r5:858dd400 r4:858dd400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:858dd400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec751e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849162c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:858dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a9f8c r4:858a9c00 r7:ddde2d80 r6:83018200 r5:858a9f8c r4:858f8500 Exception stack(0xec751fb0 to 0xec751ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829188dc r9:ec759d84 r8:00000002 r7:60000113 r6:ec759d8c r5:858db000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb855000 r5:858aa78c r4:858aa400 r10:61c88647 r9:858db000 r8:858f85ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec759fb0 to 0xec759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f0f40 INFO: task kworker/1:806:5733 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a597a000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r9:83018205 r8:858dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 r5:00001000 r4:ebafd000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe05e5d28 to 0xe05e5d70) r4:82ac11e4 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Not tainted 6.15.0-syzkaller #0 r4:849a0c00 r4:00000000 r4:00000000 r5:00001000 r4:eb87f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec769fb0 to 0xec769ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b8100 INFO: task kworker/1:808:5737 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a62c6000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829188dc r9:ec76dd84 r8:00000002 r7:60000113 r6:ec76dd8c r5:849a1800 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb98f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858ab38c r4:858f8700 Exception stack(0xec76dfb0 to 0xec76dff8) INFO: task kworker/1:809:5739 is blocked on a mutex likely owned by task kworker/1:153:3802. 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:00000000 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb9ab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:849a2400 r8:858f87ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e5dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:811:5743 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:811 state:D stack:0 pid:5743 tgid:5743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec779d84 r8:00000002 r7:60000013 r6:ec779d8c r5:849a3c00 r4:849a3c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849a3c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec779e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b8600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858aaf8c r4:858aac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858aaf8c r4:858f8800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a3c00 r8:858f882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858f8800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f8800 r8:8027f5e8 r7:ec761e60 r6:852cb680 r5:849a3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec779fb0 to 0xec779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b81c0 INFO: task kworker/1:811:5743 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a6550000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 INFO: task kworker/1:812:5746 blocked for more than 473 seconds. r4:849a3000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec781e08 r5:00001000 r4:eb9fb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec781fb0 to 0xec781ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849a5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec785e08 r5:00001000 r4:eba19000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:858abf8c r4:858abc00 r7:ddde2d80 r6:83018200 r5:858abf8c r4:858f8900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a5400 r8:858f892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858f8900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f8900 r8:8027f5e8 r7:ec761e60 r6:852cb800 r5:849a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec785fb0 to 0xec785ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b8880 INFO: task kworker/1:813:5748 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a6c73000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:814:5750 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:814 state:D stack:0 pid:5750 tgid:5750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec5b9d84 r8:00000002 r7:60000113 r6:ec5b9d8c r5:856da400 r4:856da400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856da400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b8b00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856da400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba8b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b038c r4:858b0000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b038c r4:858f8980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856da400 r8:858f89ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858f8980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f8980 r8:8027f5e8 r7:ec761e60 r6:858f8300 r5:856da400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5b9fb0 to 0xec5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b81c0 INFO: task kworker/1:814:5750 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebab5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:858f8a00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:856e0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec791e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:858f8a80 r8:8027f5e8 r7:ec761e60 r6:858f8c00 r5:856e0000 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:817:5757 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:817 state:D stack:0 pid:5757 tgid:5757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec795d84 r8:00000002 r7:60000013 r6:ec795d8c r5:856e0c00 r4:856e0c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e0c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec795e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f06c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb61000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b178c r4:858b1400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b178c r4:858f8b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e0c00 r8:858f8bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858f8b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f8b80 r8:8027f5e8 r7:ec761e60 r6:858f8c80 r5:856e0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec795fb0 to 0xec795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b8ec0 INFO: task kworker/1:817:5757 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a784d000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:818:5759 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:818 state:D stack:0 pid:5759 tgid:5759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec799d84 r8:00000002 r7:60000013 r6:ec799d8c r5:856e1800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec799e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbc1000 r5:858b278c r4:858b2400 r10:61c88647 r9:856e1800 r8:858f8d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 r5:85c39b8c r4:85c39800 r4:846ded80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:856e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 r5:00001000 r4:ebb81000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b1b8c r4:858b1800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b1b8c r4:858f8e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e2400 r8:858f8e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858f8e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f8e00 r8:8027f5e8 r7:ec799e60 r6:858f8f00 r5:856e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5e5fb0 to 0xec5e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d6140 INFO: task kworker/1:819:5760 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a784d000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:820:5762 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:820 state:D stack:0 pid:5762 tgid:5762 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec79dd84 r8:00000002 r7:60000113 r6:ec79dd8c r5:856e3000 r4:856e3000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e3000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec79de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d6500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb91000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b1f8c r4:858b1c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b1f8c r4:858f8e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e3000 r8:858f8eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858f8e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f8e80 r8:8027f5e8 r7:ec799e60 r6:858f8f80 r5:856e3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec79dfb0 to 0xec79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d6240 INFO: task kworker/1:820:5762 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a7d7b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:821:5764 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:821 state:D stack:0 pid:5764 tgid:5764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec7a1d84 r8:00000002 r7:60000013 r6:ec7a1d8c r5:856e3c00 r4:856e3c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e3c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d6640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebba1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b138c r4:858b1000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b138c r4:854db000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e3c00 r8:854db02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854db000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854db000 r8:8027f5e8 r7:ec799e60 r6:854db100 r5:856e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7a1fb0 to 0xec7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d6140 INFO: task kworker/1:821:5764 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a806f000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:822:5767 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:822 state:D stack:0 pid:5767 tgid:5767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec7a9d84 r8:00000002 r7:60000113 r6:ec7a9d8c r5:856e4800 r4:856e4800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e4800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d67c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b238c r4:858b2000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b238c r4:854db080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e4800 r8:854db0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854db080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854db080 r8:8027f5e8 r7:ec799e60 r6:854db200 r5:856e4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7a9fb0 to 0xec7a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d64c0 INFO: task kworker/1:822:5767 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a806f000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:823:5769 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:823 state:D stack:0 pid:5769 tgid:5769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec7add84 r8:00000002 r7:60000113 r6:ec7add8c r5:856e5400 r4:856e5400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e5400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7ade08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d6c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc59000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b2b8c r4:858b2800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b2b8c r4:854db180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e5400 r8:854db1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854db180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854db180 r8:8027f5e8 r7:ec799e60 r6:854db300 r5:856e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7adfb0 to 0xec7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d6080 INFO: task kworker/1:823:5769 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a850c000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:824:5771 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:824 state:D stack:0 pid:5771 tgid:5771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec7b1d84 r8:00000002 r7:60000013 r6:ec7b1d8c r5:856e6000 r4:856e6000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e6000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d6b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc4b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b2f8c r4:858b2c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b2f8c r4:854db280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e6000 r8:854db2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854db280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854db280 r8:8027f5e8 r7:ec7ade60 r6:854db400 r5:856e6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7b1fb0 to 0xec7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d6980 INFO: task kworker/1:824:5771 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a850c000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:825:5773 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:825 state:D stack:0 pid:5773 tgid:5773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec7b5d84 r8:00000002 r7:60000113 r6:ec7b5d8c r5:856e6c00 r4:856e6c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e6c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d6f40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec481000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b338c r4:858b3000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b338c r4:854db380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e6c00 r8:854db3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854db380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854db380 r8:8027f5e8 r7:ec7ade60 r6:854db500 r5:856e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7b5fb0 to 0xec7b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d6880 INFO: task kworker/1:825:5773 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a8b26000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:826:5774 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:826 state:D stack:0 pid:5774 tgid:5774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec7a5d84 r8:00000002 r7:60000013 r6:ec7a5d8c r5:856e8000 r4:856e8000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e8000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d6e40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc73000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b378c r4:858b3400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b378c r4:854db480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e8000 r8:854db4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854db480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854db480 r8:8027f5e8 r7:ec7b5e60 r6:854db580 r5:856e8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7a5fb0 to 0xec7a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d6880 INFO: task kworker/1:826:5774 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a8b26000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:827:5777 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:827 state:D stack:0 pid:5777 tgid:5777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec7b9d84 r8:00000002 r7:60000113 r6:ec7b9d8c r5:856e8c00 r4:856e8c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e8c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ad2c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4b5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b838c r4:858b8000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b838c r4:854db600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e8c00 r8:854db62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854db600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854db600 r8:8027f5e8 r7:ec7b5e60 r6:854db680 r5:856e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7b9fb0 to 0xec7b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d6880 INFO: task kworker/1:827:5777 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a8e8e000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:828:5778 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:828 state:D stack:0 pid:5778 tgid:5778 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec7bdd84 r8:00000002 r7:60000113 r6:ec7bdd8c r5:856e9800 r4:856e9800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856e9800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7bde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b8580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec495000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b3b8c r4:858b3800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b3b8c r4:854db700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e9800 r8:854db72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854db700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854db700 r8:8027f5e8 r7:ec7b9e60 r6:854db780 r5:856e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7bdfb0 to 0xec7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d6880 INFO: task kworker/1:828:5778 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a9314000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:829:5781 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:829 state:D stack:0 pid:5781 tgid:5781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec7c1d84 r8:00000002 r7:60000113 r6:ec7c1d8c r5:856ea400 r4:856ea400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ea400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ad040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4a5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b3f8c r4:858b3c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b3f8c r4:854db800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ea400 r8:854db82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854db800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854db800 r8:8027f5e8 r7:ec7b9e60 r6:854db880 r5:856ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7c1fb0 to 0xec7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ad140 INFO: task kworker/1:829:5781 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a9694000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:830:5782 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:830 state:D stack:0 pid:5782 tgid:5782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec7c5d84 r8:00000002 r7:60000013 r6:ec7c5d8c r5:856eb000 r4:856eb000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856eb000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ad500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4c5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b878c r4:858b8400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b878c r4:854db900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856eb000 r8:854db92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854db900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854db900 r8:8027f5e8 r7:ec7b9e60 r6:854db980 r5:856eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7c5fb0 to 0xec7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ad340 INFO: task kworker/1:830:5782 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a9694000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:831:5785 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:831 state:D stack:0 pid:5785 tgid:5785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec7c9d84 r8:00000002 r7:60000113 r6:ec7c9d8c r5:856ebc00 r4:856ebc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ebc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854adb00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b978c r4:858b9400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b978c r4:854dba00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ebc00 r8:854dba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dba00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dba00 r8:8027f5e8 r7:ec7c5e60 r6:854dba80 r5:856ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7c9fb0 to 0xec7c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:00000000 5d20: a9a84000 ecf0d000 00000001 80239b98 7f15d000 00000001 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:832:5787 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:832 state:D stack:0 pid:5787 tgid:5787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec7d1d84 r8:00000002 r7:60000113 r6:ec7d1d8c r5:856ec800 r4:856ec800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ec800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ad700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4d9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b8f8c r4:858b8c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b8f8c r4:854dbb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ec800 r8:854dbbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dbb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dbb80 r8:8027f5e8 r7:ec7c9e60 r6:854dbb00 r5:856ec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d1fb0 to 0xec7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ad640 INFO: task kworker/1:832:5787 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a9e32000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:856ed400 r4:829188d8 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ad7c0 r5:00001000 r4:ec4e9000 r5:858b938c r4:858b9000 r4:854dbc00 dfa0: 00000000 00000000 00000000 00000000 Call trace: 5d20: a9e32000 ecf0d000 00000001 80239b98 7f15d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Not tainted 6.15.0-syzkaller #0 r4:856eec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d9e08 r5:00001000 r4:ec519000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b9b8c r4:858b9800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858b9b8c r4:854dbc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856eec00 r8:854dbcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854dbc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854dbc80 r8:8027f5e8 r7:ec7c9e60 r6:854dbd80 r5:856eec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d9fb0 to 0xec7d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ad100 INFO: task kworker/1:834:5790 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: a9e32000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:835:5792 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec539000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85950c00 r8:854dbe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:00001000 r4:ecf01000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:836 state:D stack:0 pid:5794 tgid:5794 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7e1e08 r5:00001000 r4:ec529000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858b9f8c r4:854dbe80 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854ad640 INFO: task kworker/1:836:5794 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: aa844000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:837:5796 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:837 state:D stack:0 pid:5796 tgid:5796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec7e5d84 r8:00000002 r7:60000113 r6:ec7e5d8c r5:85951800 r4:85951800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85951800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7e5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85989280 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85951800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec561000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858ba78c r4:858ba400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ba78c r4:85780f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85951800 r8:85780fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85780f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85780f80 r8:8027f5e8 r7:ec7dde60 r6:85640f80 r5:85951800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7e5fb0 to 0xec7e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854adb40 INFO: task kworker/1:837:5796 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: aac3d000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r4:84a7de40 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec551000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858ba38c r4:8598d000 r4:00000001 Exception stack(0xec7d5fb0 to 0xec7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854b8fc0 INFO: task kworker/1:838:5798 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: aac3d000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:839:5801 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:839 state:D stack:0 pid:5801 tgid:5801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec7e9d84 r8:00000002 r7:60000113 r6:ec7e9d8c r5:85953c00 r4:85953c00 r5:85953c00 r4:829188d8 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb2cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85953c00 r8:8598d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d20: aae1c000 ecf0d000 00000001 80239b98 7f15d000 00000001 r4:e05e5dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85954800 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfb49000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858bab8c r4:8598d200 Exception stack(0xec7edfb0 to 0xec7edff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ab42f000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:841:5804 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:841 state:D stack:0 pid:5804 tgid:5804 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec7f1d84 r8:00000002 r7:60000113 r6:ec7f1d8c r5:85955400 r4:85955400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85955400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85989580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85955400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e89af000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858baf8c r4:858bac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858baf8c r4:8598d300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85955400 r8:8598d32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d300 r8:8027f5e8 r7:ec7e9e60 r6:8598d400 r5:85955400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7f1fb0 to 0xec7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85989480 INFO: task kworker/1:841:5804 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ab8f4000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:842:5806 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:842 state:D stack:0 pid:5806 tgid:5806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec7fdd84 r8:00000002 r7:60000013 r6:ec7fdd8c r5:849a6000 r4:849a6000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849a6000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7fde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85989780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac2d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bb78c r4:858bb400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bb78c r4:8598d380 r10:00000000 r9:8598d380 r8:8027f5e8 r7:ec7e9e60 r6:852cb780 r5:849a6000 r4:859894c0 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r4:846ded80 r4:00000001 r4:84a7de40 task:kworker/1:843 state:D stack:0 pid:5808 tgid:5808 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec805e08 r5:00001000 r4:eb0f5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858bbb8c r4:8598d480 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:84a7de40 task:kworker/1:844 state:D stack:0 pid:5810 tgid:5810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec80dd84 r8:00000002 r7:60000113 r6:ec80dd8c r5:849a4800 r4:849a4800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849a4800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec80de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85989540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3e3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bb38c r4:858bb000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858bb38c r4:8598d500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849a4800 r8:8598d52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d500 r8:8027f5e8 r7:ec7e9e60 r6:852cb900 r5:849a4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec80dfb0 to 0xec80dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85989880 INFO: task kworker/1:844:5810 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: abdff000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 INFO: task kworker/1:845:5812 blocked for more than 474 seconds. r4:849a0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec815e08 r5:00001000 r4:eb4a1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858c438c r4:8598d580 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 INFO: task kworker/1:846:5814 blocked for more than 474 seconds. r4:84800c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec81de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580cf40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84800c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5bf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c878c r4:858c8400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858c878c r4:8598d680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84800c00 r8:8598d6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598d680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598d680 r8:8027f5e8 r7:ec815e60 r6:852cba00 r5:84800c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec81dfb0 to 0xec81dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85989980 INFO: task kworker/1:846:5814 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ac010000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84800000 r4:829188d8 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:858c478c r4:8598d700 r4:85989c00 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Workqueue: events bpf_prog_free_deferred [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85989c00 INFO: task kworker/1:848:5818 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: acae0000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb70f000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:80000013 r4:80239bb0 r5:00001000 r4:ecf01000 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 task:kworker/1:850 state:D stack:0 pid:5823 tgid:5823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec841d84 r8:00000002 r7:60000113 r6:ec841d8c r5:84805400 r4:84805400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84805400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec841e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f7d80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84805400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb74d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8598d600 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ecf01000 r4:846ded80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84803000 r4:829188d8 r9:83018205 r8:84803000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bb0 r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:852:5827 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:852 state:D stack:0 pid:5827 tgid:5827 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec851d84 r8:00000002 r7:60000113 r6:ec851d8c r5:84804800 r4:84804800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84804800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec851e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb8bb000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d20: acfa2000 ecf0d000 00000001 80239b98 7f15d000 00000001 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:853:5829 blocked for more than 474 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec859e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8580c2c0 5d20: acfa2000 ecf0d000 00000001 80239b98 7f15d000 00000001 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a7de40 r10:829188dc r9:ec861d84 r8:00000002 r7:60000113 r6:ec861d8c r5:8482bc00 r5:00001000 r4:eb937000 r7:ddde2d80 r6:83018200 r5:858c638c r4:8598da80 r4:8598da80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598da80 r8:8027f5e8 r7:ec81de60 r6:852cbe00 r5:8482bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec861fb0 to 0xec861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8580c4c0 INFO: task kworker/1:854:5831 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ad4b8000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:855 state:D stack:0 pid:5832 tgid:5832 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8580c600 INFO: task kworker/1:855:5832 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ad4b8000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85931800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580c800 r5:00001000 r4:ebb15000 r7:ddde2d80 r6:83018200 r5:858c6b8c r4:8598db80 r4:8580c3c0 Exception stack(0xe05e5d28 to 0xe05e5d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 task:kworker/1:857 state:D stack:0 pid:5836 tgid:5836 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec875e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580c740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85930000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb2b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c6f8c r4:858c6c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858c6f8c r4:8598dc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85930000 r8:8598dc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598dc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598dc00 r8:8027f5e8 r7:ec81de60 r6:852cbf80 r5:85930000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec875fb0 to 0xec875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8580c600 INFO: task kworker/1:857:5836 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ad91e000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:846ded80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85930c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec87de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8580ca80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85930c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec573000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c738c r4:858c7000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858c738c r4:8598dc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85930c00 r8:8598dcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598dc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598dc80 r8:8027f5e8 r7:ec81de60 r6:85861000 r5:85930c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec87dfb0 to 0xec87dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8580c980 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85932400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 r5:00001000 r4:ec583000 r5:858c7b8c r4:858c7800 r7:ddde2d80 r6:83018200 r5:858c7b8c r4:8598dd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85932400 r8:8598dd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598dd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598dd00 r8:8027f5e8 r7:ec81de60 r6:85861080 r5:85932400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec885fb0 to 0xec885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8580c9c0 INFO: task kworker/1:859:5840 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ae276000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec593000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 r5:00001000 r4:ecf01000 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:861:5844 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:861 state:D stack:0 pid:5844 tgid:5844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec891d84 r8:00000002 r7:60000113 r6:ec891d8c r5:85934800 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec5cf000 r7:ddde2d80 r6:83018200 r5:858c8b8c r4:8598de00 r4:8580cd00 r4:00000000 r4:82ac11e4 r5:00001000 r4:ecf01000 r4:00000001 INFO: task kworker/1:862:5848 blocked for more than 474 seconds. [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:8534a78c r4:8598de80 r4:85989e00 5d20: aea78000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb02f000 r10:61c88647 r9:85935400 r8:8598df2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:00001000 r4:ecf01000 r4:846ded80 INFO: task kworker/0:488:5851 blocked for more than 474 seconds. r4:00000000 r5:00001000 r4:ebaaf000 r7:dddced80 r6:83018000 r5:85349f8c r4:85861300 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85808d40 INFO: task kworker/0:488:5851 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: aedac000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 task:kworker/1:864 state:D stack:0 pid:5854 tgid:5854 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eaca9000 r5:858c8f8c r4:858c8c00 Exception stack(0xec889fb0 to 0xec889ff8) r5:80000013 r4:80239bb0 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r5:00001000 r4:eb7cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858ca78c r4:858ca400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ca78c r4:8581d100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85940000 r8:8581d12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581d100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581d100 r8:8027f5e8 r7:ec89de60 r6:85861480 r5:85940000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a1fb0 to 0xec8a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9e040 INFO: task kworker/1:865:5856 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: aefb9000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84a7de40 r4:85941800 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb1c3000 r10:61c88647 r9:85941800 r8:8581d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:00001000 r4:ecf01000 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:85940c00 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb5dd000 r10:61c88647 r9:85940c00 r8:8581d1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:868:5862 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:868 state:D stack:0 pid:5862 tgid:5862 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec8b9d84 r8:00000002 r7:60000113 r6:ec8b9d8c r5:85942400 r4:85942400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85942400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9e640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85942400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb677000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b9e2c0 Exception stack(0xe05e5d28 to 0xe05e5d70) r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb787000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:870:5866 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:870 state:D stack:0 pid:5866 tgid:5866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec8c9d84 r8:00000002 r7:60000113 r6:ec8c9d8c r5:85943c00 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb801000 r10:61c88647 r9:85943c00 r8:8581d32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r5:00001000 r4:ecf01000 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:872:5870 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:872 state:D stack:0 pid:5870 tgid:5870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec8d9d84 r8:00000002 r7:60000113 r6:ec8d9d8c r5:85945400 r4:85945400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85945400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c90c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85945400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2b7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858cc38c r4:858cc000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858cc38c r4:8581d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85945400 r8:8581d42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581d400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581d400 r8:8027f5e8 r7:ec8d1e60 r6:85861800 r5:85945400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d9fb0 to 0xec8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9e800 INFO: task kworker/1:872:5870 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ec8e1d84 r8:00000002 r7:60000113 r6:ec8e1d8c r5:85946000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb97b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec8e1fb0 to 0xec8e1ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:ec8e9d84 r8:00000002 r7:60000113 r6:ec8e9d8c r5:85946c00 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb99f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec8e9fb0 to 0xec8e9ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: b0423000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:875:5876 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:875 state:D stack:0 pid:5876 tgid:5876 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec831d84 r8:00000002 r7:60000113 r6:ec831d8c r5:85948c00 r4:85948c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85948c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec831e08 r9:83018205 r8:85948c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 r5:00001000 r4:dfb61000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec831fb0 to 0xec831ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ec835d84 r8:00000002 r7:60000013 r6:ec835d8c r5:85949800 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eaa3d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858cbf8c r4:8581d600 r4:84b9ef40 Exception stack(0xe05e5d28 to 0xe05e5d70) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85952400 r4:00000000 r9:83018205 r8:85952400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 r5:00001000 r4:eaee7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c7f8c r4:858c7c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858c7f8c r4:8581d680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85952400 r8:8581d6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581d680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581d680 r8:8027f5e8 r7:ec8d9e60 r6:8581d700 r5:85952400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8edfb0 to 0xec8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8580c600 INFO: task kworker/1:877:5880 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: b0b90000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:878:5882 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:878 state:D stack:0 pid:5882 tgid:5882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec849d84 r8:00000002 r7:60000013 r6:ec849d8c r5:85956c00 r4:85956c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85956c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec849e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 r5:00001000 r4:eb3e5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829188dc r9:ec855d84 r8:00000002 r7:60000013 r6:ec855d8c r5:85956000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb763000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858cd38c r4:858cd000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858cd38c r4:8581d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85956000 r8:8581d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581d780 r8:8027f5e8 r7:ec849e60 r6:8581d900 r5:85956000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec855fb0 to 0xec855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c9080 INFO: task kworker/1:879:5884 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: b0ecb000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:856ee000 r4:00000000 r5:00001000 r4:eb50f000 r5:858ccb8c r4:858cc800 Exception stack(0xec869fb0 to 0xec869ff8) r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8f1e08 r5:00001000 r4:eb6bf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:882:5890 blocked for more than 474 seconds. r4:00000000 r5:00001000 r4:eb71f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858cd78c r4:858cd400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858cd78c r4:8581da80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85939800 r8:8581daac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581da80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581da80 r8:8027f5e8 r7:ec855e60 r6:8581db80 r5:85939800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec621fb0 to 0xec621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c93c0 INFO: task kworker/1:882:5890 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: b15a5000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a7de40 Workqueue: events bpf_prog_free_deferred r5:85938000 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb9d1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:858cef8c r4:858cec00 r10:61c88647 r9:85938000 r8:8581dc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:e05e5dc0 r5:00001000 r4:ecf01000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:884:5894 blocked for more than 474 seconds. r4:8593a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8fde08 r5:00001000 r4:eb8b5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec8fdfb0 to 0xec8fdff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: b1922000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:885:5896 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:885 state:D stack:0 pid:5896 tgid:5896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec901d84 r8:00000002 r7:60000013 r6:ec901d8c r5:8593c800 r4:8593c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8593c800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec901e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c9e40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8593c800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8fb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858ce38c r4:858ce000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858ce38c r4:8581dd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593c800 r8:8581ddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8581dd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8581dd80 r8:8027f5e8 r7:ec8f9e60 r6:8581df00 r5:8593c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec901fb0 to 0xec901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:846c9d00 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:886 state:D stack:0 pid:5898 tgid:5898 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb94f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858ce78c r4:8581de80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c9c00 INFO: task kworker/1:886:5898 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: b1f11000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:887:5901 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:ec8f5d84 r8:00000002 r7:60000113 r6:ec8f5d8c r5:8593d400 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb971000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:858cdb8c r4:858cd800 r10:61c88647 r9:8593d400 r8:84a7712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e5d28 to 0xe05e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8593e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec90de08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84a77080 r8:8027f5e8 r7:ec8f9e60 r6:84a77180 r5:8593e000 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:889:5904 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:889 state:D stack:0 pid:5904 tgid:5904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec915d84 r8:00000002 r7:60000113 r6:ec915d8c r5:8594a400 r4:8594a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8594a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec915e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c7ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8594a400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb5f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d438c r4:858d4000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d438c r4:84a77200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8594a400 r8:84a7722c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a77200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a77200 r8:8027f5e8 r7:ec90de60 r6:85861a80 r5:8594a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec915fb0 to 0xec915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c7380 INFO: task kworker/1:889:5904 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: b2209000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:8594b000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec919e08 r5:00001000 r4:ebadf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858ceb8c r4:84a77280 Exception stack(0xec919fb0 to 0xec919ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:489:5910 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:489 state:D stack:0 pid:5910 tgid:5910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec91dd84 r8:00000002 r7:60000113 r6:ec91dd8c r5:8594d400 r4:8594d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8594d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec91de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ac5c80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8594d400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec49d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534af8c r4:8534ac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534af8c r4:85861c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8594d400 r8:85861c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85861c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85861c00 r8:8027f5e8 r7:eb6a5e60 r6:85861c80 r5:8594d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec91dfb0 to 0xec91dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e5d28 to 0xe05e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84a7de40 task:kworker/1:891 state:D stack:0 pid:5912 tgid:5912 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:8594e000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r5:00001000 r4:ebb03000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ec925d84 r8:00000002 r7:60000013 r6:ec925d8c r5:8594ec00 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebb1d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858cff8c r4:84a77380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8594ec00 r8:84a773ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a77380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a77380 r8:8027f5e8 r7:ec915e60 r6:85861d00 r5:8594ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec925fb0 to 0xec925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c7980 INFO: task kworker/1:892:5913 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: b2c7a000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:893:5915 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:893 state:D stack:0 pid:5915 tgid:5915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec929d84 r8:00000002 r7:60000113 r6:ec929d8c r5:8594c800 r4:8594c800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ebc53000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 5d60: 80230ad4 80239bb0 80000013 ffffffff [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebb87000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:895:5919 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:895 state:D stack:0 pid:5919 tgid:5919 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec931d84 r8:00000002 r7:60000013 r6:ec931d8c r5:85948000 r4:85948000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85948000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec931e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c7dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85948000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb99000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d4f8c r4:858d4c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d4f8c r4:84a77580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85948000 r8:84a775ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a77580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a77580 r8:8027f5e8 r7:ec929e60 r6:85861e80 r5:85948000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec931fb0 to 0xec931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c7c40 INFO: task kworker/1:895:5919 is blocked on a mutex likely owned by task kworker/1:153:3802. Exception stack(0xe05e5d28 to 0xe05e5d70) r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829188dc r9:ec935d84 r8:00000002 r7:60000113 r6:ec935d8c r5:84803c00 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebbaf000 r5:858d538c r4:858d5000 r10:61c88647 r9:84803c00 r8:84a7752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:897:5923 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:897 state:D stack:0 pid:5923 tgid:5923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec939d84 r8:00000002 r7:60000013 r6:ec939d8c r5:850e0000 r4:850e0000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850e0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec939e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c7fc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc17000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d578c r4:858d5400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d578c r4:84a77600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850e0000 r8:84a7762c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a77600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a77600 r8:8027f5e8 r7:ec929e60 r6:85861f80 r5:850e0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec939fb0 to 0xec939ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846c7d80 INFO: task kworker/1:897:5923 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 Exception stack(0xe05e5d28 to 0xe05e5d70) r4:82ac11e4 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec487000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe05e5d28 to 0xe05e5d70) 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:899:5927 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:899 state:D stack:0 pid:5927 tgid:5927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:850e1800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850e1800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec941e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8f880 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc6d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d5f8c r4:858d5c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d5f8c r4:84a77780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850e1800 r8:84a777ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a77780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a77780 r8:8027f5e8 r7:ec93de60 r6:84abd080 r5:850e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec941fb0 to 0xec941ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:846c7c40 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 80000013 ffffffff [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:850e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 r5:00001000 r4:ec4cb000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ec911d84 r8:00000002 r7:60000113 r6:ec911d8c r5:850e3000 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec911e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7e480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4b3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d678c r4:858d6400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d678c r4:84a77800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850e3000 r8:84a7782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a77800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a77800 r8:8027f5e8 r7:ec945e60 r6:84abd180 r5:850e3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec911fb0 to 0xec911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7e240 INFO: task kworker/1:901:5932 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: b47f0000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Not tainted 6.15.0-syzkaller #0 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec51f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8534b78c r4:84abd280 Exception stack(0xec949fb0 to 0xec949ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: b4b02000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:850e4800 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec4e1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a77880 r8:8027f5e8 r7:ec945e60 r6:84abd300 r5:850e4800 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:903:5938 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:903 state:D stack:0 pid:5938 tgid:5938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec951d84 r8:00000002 r7:60000113 r6:ec951d8c r5:850e5400 r4:850e5400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850e5400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec951e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7ec80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec567000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:850e5400 r8:84a7792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850e6000 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec4fb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84a77a00 r8:8027f5e8 r7:ec951e60 r6:84abd400 r5:850e6000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:905:5942 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:905 state:D stack:0 pid:5942 tgid:5942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec959d84 r8:00000002 r7:60000013 r6:ec959d8c r5:850e6c00 r4:850e6c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850e6c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec959e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7e980 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec531000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d778c r4:858d7400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d778c r4:84a77a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850e6c00 r8:84a77aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a77a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a77a80 r8:8027f5e8 r7:ec951e60 r6:84abd480 r5:850e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec959fb0 to 0xec959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7e940 INFO: task kworker/1:905:5942 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 5d60: 80230ad4 80239bb0 80000013 ffffffff [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec95de08 r5:00001000 r4:ec54f000 r4:84a77b00 r4:84a7e000 Exception stack(0xe05e5d28 to 0xe05e5d70) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ec57d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:858cfb8c r4:84a77980 Exception stack(0xec961fb0 to 0xec961ff8) r4:84a7ea80 INFO: task kworker/1:907:5946 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: b5be5000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:491:5947 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:491 state:D stack:0 pid:5947 tgid:5947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec965d84 r8:00000002 r7:60000113 r6:ec965d8c r5:85871800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec965e08 r5:00001000 r4:ec595000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:908:5949 blocked for more than 475 seconds. r4:00000000 r5:00001000 r4:eb0fb000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 INFO: task kworker/1:909:5951 blocked for more than 475 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec971d84 r8:00000002 r7:60000013 r6:ec971d8c r5:85873c00 r4:85873c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85873c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec971e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7eec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85873c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb85000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1c38c r4:85a1c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a1c38c r4:84a77c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85873c00 r8:84a77cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a77c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a77c80 r8:8027f5e8 r7:ec969e60 r6:84abd780 r5:85873c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec971fb0 to 0xec971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84abd800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e5dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a7e3c0 r5:00001000 r4:eade3000 r5:85a1c78c r4:85a1c400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: b6c16000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:911:5958 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:911 state:D stack:0 pid:5958 tgid:5958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec989d84 r8:00000002 r7:60000013 r6:ec989d8c r5:85875400 r4:85875400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85875400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec989e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c95c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85875400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1e38c r4:85a1e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a1e38c r4:84a77b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85875400 r8:84a77bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a77b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a77b80 r8:8027f5e8 r7:ec969e60 r6:84abd980 r5:85875400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec989fb0 to 0xec989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916940 INFO: task kworker/1:911:5958 is blocked on a mutex likely owned by task kworker/1:153:3802. Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d28 to 0xe05e5d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:912:5959 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:912 state:D stack:0 pid:5959 tgid:5959 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec98dd84 r8:00000002 r7:60000113 r6:ec98dd8c r5:85876000 r4:85876000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85876000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec98de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c9740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85876000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1d38c r4:85a1d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a1d38c r4:84a77e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85876000 r8:84a77e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a77e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a77e00 r8:8027f5e8 r7:ec989e60 r6:84abda00 r5:85876000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec98dfb0 to 0xec98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84916940 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:e05e5dc0 r5:00001000 r4:ecf01000 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:913:5961 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:913 state:D stack:0 pid:5961 tgid:5961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec995d84 r8:00000002 r7:60000013 r6:ec995d8c r5:85878c00 r4:85878c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85878c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec995e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846c95c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85878c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb679000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1cb8c r4:85a1c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84a77f00 r8:8027f5e8 r7:ec989e60 r6:84abda80 r5:85878c00 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r5:85c39b8c r4:85c39800 r4:846ded80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7ef000 r7:ddde2d80 r6:83018200 r5:85a1d78c r4:84a77e80 r10:00000000 r9:84a77e80 r8:8027f5e8 r7:ec989e60 r6:84abdb00 r5:85878000 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:915:5966 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:915 state:D stack:0 pid:5966 tgid:5966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec9a1d84 r8:00000002 r7:60000113 r6:ec9a1d8c r5:8587b000 r4:8587b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8587b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb863000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a1db8c r4:84a77f80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:e05e5dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/1:916:5968 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:916 state:D stack:0 pid:5968 tgid:5968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec9a9d84 r8:00000002 r7:60000013 r6:ec9a9d8c r5:8587a400 r4:8587a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8587a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c9400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8587a400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb989000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1df8c r4:85a1dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a1df8c r4:852c7100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8587a400 r8:852c712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7100 r8:8027f5e8 r7:ec989e60 r6:84abdc80 r5:8587a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a9fb0 to 0xec9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c91c0 INFO: task kworker/1:916:5968 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 5d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:917:5972 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:917 state:D stack:0 pid:5972 tgid:5972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec909d84 r8:00000002 r7:60000013 r6:ec909d8c r5:85959800 r4:85959800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85959800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec909e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c9940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85959800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5d9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1ef8c r4:85a1ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a1ef8c r4:852c7000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85959800 r8:852c702c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 INFO: task kworker/1:918:5973 blocked for more than 475 seconds. [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c9780 r5:00001000 r4:ec5c7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1e78c r4:85a1e400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a1e78c r4:852c7180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8595a400 r8:852c71ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7180 r8:8027f5e8 r7:ec909e60 r6:852c7200 r5:8595a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec96dfb0 to 0xec96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c93c0 INFO: task kworker/1:918:5973 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: b877b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 r5:85c39b8c r4:85c39800 r4:846ded80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ade08 r5:00001000 r4:ec657000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a1f38c r4:852c7280 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e5dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:846ded80 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8595c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec647000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497fb8c r4:8497f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497fb8c r4:84abdc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8595c800 r8:84abdc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abdc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abdc00 r8:8027f5e8 r7:ec975e60 r6:852c7400 r5:8595c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9bdfb0 to 0xec9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9a180 INFO: task kworker/0:493:5977 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: b877b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:920:5978 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec637000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a1eb8c r4:852c7380 1fa0: 00000000 00000000 00000000 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r9:83018205 r8:8595ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r5:00001000 r4:ec6b3000 r7:ddde2d80 r6:83018200 r5:85a1f78c r4:852c7500 r10:61c88647 r9:8595ec00 r8:852c752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7500 r8:8027f5e8 r7:ec9ade60 r6:852c7600 r5:8595ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c9fb0 to 0xec9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852c9c40 INFO: task kworker/1:921:5980 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: b877b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 INFO: task kworker/0:494:5982 blocked for more than 475 seconds. r5:8587e000 r4:829188d8 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9a600 r5:00001000 r4:ec667000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e5d28 to 0xe05e5d70) r4:82ac11e4 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553fe40 r5:00001000 r4:ebae9000 r5:8497e38c r4:8497e000 r4:84abdd00 5fa0: 00000000 00000000 00000000 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: b94a7000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:496:5987 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:496 state:D stack:0 pid:5987 tgid:5987 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec9b1d84 r8:00000002 r7:60000113 r6:ec9b1d8c r5:8587c800 r5:8587c800 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ec6a3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8497ef8c r4:84abdf00 r10:00000000 r9:84abdf00 r8:8027f5e8 r7:ec9c5e60 r6:84abdf80 r5:8587c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e5dc0 r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6cf000 r7:ddde2d80 r6:83018200 r5:85a1fb8c r4:852c7580 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r5:85c39b8c r4:85c39800 r4:846ded80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85771480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8587bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f12d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece7f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473d78c r4:8473d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473d78c r4:84b99080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8587bc00 r8:84b990ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b99080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b99080 r8:8027f5e8 r7:ec9c5e60 r6:84b99180 r5:8587bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d1fb0 to 0xec9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b9a780 INFO: task kworker/0:497:5990 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: b99c6000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:923:5993 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:923 state:D stack:0 pid:5993 tgid:5993 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec9e5d84 r8:00000002 r7:60000113 r6:ec9e5d8c r5:85a20000 r4:85a20000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a20000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6df000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:924:5994 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:924 state:D stack:0 pid:5994 tgid:5994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec9e9d84 r8:00000002 r7:60000113 r6:ec9e9d8c r5:85a20c00 r4:85a20c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a20c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85220280 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a20c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d6f8c r4:858d6c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858d6f8c r4:852c7680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a20c00 r8:852c76ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7680 r8:8027f5e8 r7:ec9e5e60 r6:84b99200 r5:85a20c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9e9fb0 to 0xec9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7e5c0 INFO: task kworker/1:924:5994 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ba0a9000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r4:846ded80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:925 state:D stack:0 pid:5996 tgid:5996 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916ac0 r5:00001000 r4:eb8db000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85a46f8c r4:852c7780 Exception stack(0xec9f1fb0 to 0xec9f1ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ba0a9000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:926:5998 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:926 state:D stack:0 pid:5998 tgid:5998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec9f9d84 r8:00000002 r7:60000113 r6:ec9f9d8c r5:85a23c00 r4:85a23c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a23c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852201c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a23c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec71f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4478c r4:85a44400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4478c r4:852c7880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a23c00 r8:852c78ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7880 r8:8027f5e8 r7:ec9f1e60 r6:84b99300 r5:85a23c00 r4:00000001 Exception stack(0xec9f9fb0 to 0xec9f9ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r5:85a23000 r4:829188d8 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca01e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852203c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a23000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec733000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4438c r4:85a44000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4438c r4:852c7800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a23000 r8:852c782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7800 r8:8027f5e8 r7:ec9f1e60 r6:84b99380 r5:85a23000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca01fb0 to 0xeca01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85220100 INFO: task kworker/1:927:6000 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ba57c000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:e05e5dc0 r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:928:6002 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:928 state:D stack:0 pid:6002 tgid:6002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eca09d84 r8:00000002 r7:60000113 r6:eca09d8c r5:85a21800 r4:85a21800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a21800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca09e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852204c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a21800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec743000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a44b8c r4:85a44800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a44b8c r4:852c7900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a21800 r8:852c792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7900 r8:8027f5e8 r7:ec9f1e60 r6:84b99400 r5:85a21800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca09fb0 to 0xeca09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85220440 INFO: task kworker/1:928:6002 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ba57c000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:929:6004 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:929 state:D stack:0 pid:6004 tgid:6004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eca11d84 r8:00000002 r7:60000113 r6:eca11d8c r5:85a24800 r4:85a24800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a24800 r4:829188d8 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec753000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a44f8c r4:85a44c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a44f8c r4:852c7a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a24800 r8:852c7aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7a80 r8:8027f5e8 r7:ec9f1e60 r6:84b99480 r5:85a24800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca11fb0 to 0xeca11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852206c0 INFO: task kworker/1:929:6004 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bb01d000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:930:6006 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:930 state:D stack:0 pid:6006 tgid:6006 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eca19d84 r8:00000002 r7:60000113 r6:eca19d8c r5:85a25400 r4:85a25400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a25400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca19e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85220100 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a25400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec763000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4538c r4:85a45000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4538c r4:852c7980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a25400 r8:852c79ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7980 r8:8027f5e8 r7:ec9f1e60 r6:84b99500 r5:85a25400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca19fb0 to 0xeca19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bb01d000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:931:6008 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:931 state:D stack:0 pid:6008 tgid:6008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec7f5d84 r8:00000002 r7:60000013 r6:ec7f5d8c r5:85876c00 r4:85876c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85876c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85220a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85876c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa83000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a45b8c r4:85a45800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a45b8c r4:852c7b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85876c00 r8:852c7bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7b80 r8:8027f5e8 r7:ec9f1e60 r6:84b99580 r5:85876c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7f5fb0 to 0xec7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85220800 INFO: task kworker/1:931:6008 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bb01d000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:932:6010 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:932 state:D stack:0 pid:6010 tgid:6010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eca25d84 r8:00000002 r7:60000113 r6:eca25d8c r5:85a26c00 r4:85a26c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a26c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca25e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852209c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a26c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4578c r4:85a45400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4578c r4:852c7a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a26c00 r8:852c7a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7a00 r8:8027f5e8 r7:ec9f1e60 r6:84b99600 r5:85a26c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca25fb0 to 0xeca25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85220840 INFO: task kworker/1:932:6010 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bb5e0000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:933:6012 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:933 state:D stack:0 pid:6012 tgid:6012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eca2dd84 r8:00000002 r7:60000113 r6:eca2dd8c r5:850f0000 r4:850f0000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850f0000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca2de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:850f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 r5:00001000 r4:ead55000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4638c r4:85a46000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4638c r4:852c7b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f0000 r8:852c7b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7b00 r8:8027f5e8 r7:ec9f1e60 r6:84b99680 r5:850f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca2dfb0 to 0xeca2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85220bc0 INFO: task kworker/1:933:6012 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bb5e0000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:934:6014 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:934 state:D stack:0 pid:6014 tgid:6014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eca35d84 r8:00000002 r7:60000113 r6:eca35d8c r5:850f1800 r4:850f1800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850f1800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca35e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85220b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb30d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a45f8c r4:85a45c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a45f8c r4:852c7c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f1800 r8:852c7cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7c80 r8:8027f5e8 r7:ec9f1e60 r6:84b99700 r5:850f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca35fb0 to 0xeca35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85220e00 INFO: task kworker/1:934:6014 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bbb40000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:935:6016 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:935 state:D stack:0 pid:6016 tgid:6016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eca39d84 r8:00000002 r7:60000013 r6:eca39d8c r5:850f2400 r4:850f2400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850f2400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca39e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85220fc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb429000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4678c r4:85a46400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4678c r4:852c7c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f2400 r8:852c7c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7c00 r8:8027f5e8 r7:ec9f1e60 r6:84b99780 r5:850f2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca39fb0 to 0xeca39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85220e40 INFO: task kworker/1:935:6016 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bbb40000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:936:6017 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:936 state:D stack:0 pid:6017 tgid:6017 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eca3dd84 r8:00000002 r7:60000013 r6:eca3dd8c r5:850f3000 r4:850f3000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850f3000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca3de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c9b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb72f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a46b8c r4:85a46800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a46b8c r4:852c7d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f3000 r8:852c7d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7d00 r8:8027f5e8 r7:ec9f1e60 r6:84b99800 r5:850f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca3dfb0 to 0xeca3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85220d00 INFO: task kworker/1:936:6017 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bc012000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:937:6021 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:937 state:D stack:0 pid:6021 tgid:6021 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eca41d84 r8:00000002 r7:60000013 r6:eca41d8c r5:850f3c00 r4:850f3c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850f3c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca41e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9ac40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4738c r4:85a47000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4738c r4:852c7e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f3c00 r8:852c7e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7e00 r8:8027f5e8 r7:ec9f1e60 r6:84b99880 r5:850f3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca41fb0 to 0xeca41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85220840 INFO: task kworker/1:937:6021 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bc012000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:846ded80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:938 state:D stack:0 pid:6024 tgid:6024 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eb9bf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a47f8c r4:85a47c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a47f8c r4:852c7e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f4800 r8:852c7eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7e80 r8:8027f5e8 r7:ec9f1e60 r6:84b99980 r5:850f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca4dfb0 to 0xeca4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85257080 INFO: task kworker/1:938:6024 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bc127000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:939:6025 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:939 state:D stack:0 pid:6025 tgid:6025 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eca51d84 r8:00000002 r7:60000013 r6:eca51d8c r5:850f6000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850f6000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca51e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb951000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a47b8c r4:85a47800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a47b8c r4:852c7d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f6000 r8:852c7dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7d80 r8:8027f5e8 r7:eca4de60 r6:84b99900 r5:850f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca51fb0 to 0xeca51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85257080 INFO: task kworker/1:939:6025 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bc127000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:940:6027 blocked for more than 475 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:850f5400 r5:850f5400 r4:829188d8 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca59e08 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:850f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r5:00001000 r4:ebac5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:850f5400 r8:852c7fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeca59fb0 to 0xeca59ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bc78a000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:941:6029 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:941 state:D stack:0 pid:6029 tgid:6029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eca61d84 r8:00000002 r7:60000113 r6:eca61d8c r5:85879800 r4:85879800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85879800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca61e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85879800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ef000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4778c r4:85a47400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4778c r4:852c7f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85879800 r8:852c7f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852c7f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c7f00 r8:8027f5e8 r7:eca59e60 r6:84b99a80 r5:85879800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca61fb0 to 0xeca61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85257200 INFO: task kworker/1:941:6029 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bc91b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:942:6031 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:942 state:D stack:0 pid:6031 tgid:6031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eca69d84 r8:00000002 r7:60000113 r6:eca69d8c r5:85a26000 r4:85a26000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a26000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca69e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a26000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba67000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4838c r4:85a48000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4838c r4:8524a100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a26000 r8:8524a12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524a100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a100 r8:8027f5e8 r7:eca59e60 r6:84b99b00 r5:85a26000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca69fb0 to 0xeca69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85257100 INFO: task kworker/1:942:6031 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bc91b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:943:6033 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:943 state:D stack:0 pid:6033 tgid:6033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eca71d84 r8:00000002 r7:60000113 r6:eca71d8c r5:85a28000 r4:85a28000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a28000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca71e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a28000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb25000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a48f8c r4:85a48c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a48f8c r4:8524a000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a28000 r8:8524a02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524a000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a000 r8:8027f5e8 r7:eca59e60 r6:84b99b80 r5:85a28000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca71fb0 to 0xeca71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852575c0 INFO: task kworker/1:943:6033 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bcd98000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 INFO: task kworker/1:944:6035 blocked for more than 475 seconds. r4:85a29800 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ebafb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a48b8c r4:85a48800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a48b8c r4:8524a180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a29800 r8:8524a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524a180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a180 r8:8027f5e8 r7:eca71e60 r6:84b99c00 r5:85a29800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca79fb0 to 0xeca79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85257700 INFO: task kworker/1:944:6035 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bcd98000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:945:6037 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:945 state:D stack:0 pid:6037 tgid:6037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eca81d84 r8:00000002 r7:60000013 r6:eca81d8c r5:85a28c00 r4:85a28c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a28c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca81e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ec4ab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4ab8c r4:85a4a800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4ab8c r4:8524a200 r4:8524a200 Exception stack(0xeca81fb0 to 0xeca81ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d28 to 0xe05e5d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:946:6039 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:946 state:D stack:0 pid:6039 tgid:6039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eca89d84 r8:00000002 r7:60000013 r6:eca89d8c r5:85a2a400 r4:85a2a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a2a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca89e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a2a400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb6d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4938c r4:85a49000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4938c r4:8524a280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a2a400 r8:8524a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524a280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a280 r8:8027f5e8 r7:eca81e60 r6:84b99d00 r5:85a2a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca89fb0 to 0xeca89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85257740 INFO: task kworker/1:946:6039 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bd7f4000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:947:6041 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:947 state:D stack:0 pid:6041 tgid:6041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eca91d84 r8:00000002 r7:60000013 r6:eca91d8c r5:85a2b000 r4:85a2b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a2b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca91e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257cc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a2b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb97000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a49b8c r4:85a49800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a49b8c r4:8524a300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a2b000 r8:8524a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524a300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a300 r8:8027f5e8 r7:eca81e60 r6:84b99d80 r5:85a2b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca91fb0 to 0xeca91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85257c40 INFO: task kworker/1:947:6041 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bd7f4000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:948:6043 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:948 state:D stack:0 pid:6043 tgid:6043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eca99d84 r8:00000002 r7:60000113 r6:eca99d8c r5:85a2bc00 r4:85a2bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a2bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca99e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a2bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4978c r4:85a49400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4978c r4:8524a400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a2bc00 r8:8524a42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524a400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a400 r8:8027f5e8 r7:eca81e60 r6:84b99e00 r5:85a2bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca99fb0 to 0xeca99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85257a40 INFO: task kworker/1:948:6043 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bdcd3000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:949:6045 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:949 state:D stack:0 pid:6045 tgid:6045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecaa1d84 r8:00000002 r7:60000113 r6:ecaa1d8c r5:85a2c800 r5:85a2c800 r4:829188d8 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852579c0 r5:00001000 r4:ebc47000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8524a380 r8:8027f5e8 r7:eca81e60 r6:84b99e80 r5:85a2c800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85257d80 INFO: task kworker/1:949:6045 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bdcd3000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaa9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8525d6c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a2ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc6b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4a78c r4:85a4a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4a78c r4:8524a080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a2ec00 r8:8524a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524a080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a080 r8:8027f5e8 r7:eca81e60 r6:84b99f00 r5:85a2ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaa9fb0 to 0xecaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85257c00 INFO: task kworker/1:950:6047 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bdcd3000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:951 state:D stack:0 pid:6049 tgid:6049 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85a2e000 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018205 r8:85a2e000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 r5:00001000 r4:ec489000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85a4a38c r4:8524a480 r10:61c88647 r9:85a2e000 r8:8524a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a480 r8:8027f5e8 r7:eca81e60 r6:84b99f80 r5:85a2e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecab1fb0 to 0xecab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8525ddc0 INFO: task kworker/1:951:6049 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: be0be000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:952:6051 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:952 state:D stack:0 pid:6051 tgid:6051 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecab9d84 r8:00000002 r7:60000113 r6:ecab9d8c r5:850f6c00 r4:850f6c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850f6c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecab9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b434c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec511000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8524a580 r10:00000000 r9:8524a580 r8:8027f5e8 r7:eca81e60 r6:84785000 r5:850f6c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: be499000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:953:6053 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:953 state:D stack:0 pid:6053 tgid:6053 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecabdd84 r8:00000002 r7:60000113 r6:ecabdd8c r5:850f0c00 r4:850f0c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850f0c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecabde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b431c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4c3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4af8c r4:85a4ac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4af8c r4:8524a500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f0c00 r8:8524a52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524a500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a500 r8:8027f5e8 r7:ecab9e60 r6:84785080 r5:850f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecabdfb0 to 0xecabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ad0d00 INFO: task kworker/1:953:6053 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: be763000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:954:6055 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:954 state:D stack:0 pid:6055 tgid:6055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecac1d84 r8:00000002 r7:60000013 r6:ecac1d8c r5:85a2d400 r4:85a2d400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a2d400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecac1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b43440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85a2d400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4e7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4b78c r4:85a4b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4b78c r4:8524a600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a2d400 r8:8524a62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524a600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a600 r8:8027f5e8 r7:ecab9e60 r6:84785100 r5:85a2d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecac1fb0 to 0xecac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b43100 INFO: task kworker/1:954:6055 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: be763000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:955:6057 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:955 state:D stack:0 pid:6057 tgid:6057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecac5d84 r8:00000002 r7:60000113 r6:ecac5d8c r5:849e8000 r4:849e8000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e8000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecac5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85257f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec58d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4e38c r4:85a4e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4e38c r4:8524a700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e8000 r8:8524a72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524a700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a700 r8:8027f5e8 r7:ecab9e60 r6:84785180 r5:849e8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecac5fb0 to 0xecac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b432c0 INFO: task kworker/1:955:6057 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: be98a000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:956:6059 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:956 state:D stack:0 pid:6059 tgid:6059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec979d84 r8:00000002 r7:60000013 r6:ec979d8c r5:849e8c00 r4:849e8c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e8c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec979e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b43640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbdf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4bb8c r4:85a4b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4bb8c r4:8524a780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e8c00 r8:8524a7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524a780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a780 r8:8027f5e8 r7:ecac5e60 r6:84785200 r5:849e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec979fb0 to 0xec979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b43200 INFO: task kworker/1:956:6059 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: becc6000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:957:6061 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:957 state:D stack:0 pid:6061 tgid:6061 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecac9d84 r8:00000002 r7:60000013 r6:ecac9d8c r5:849e9800 r4:849e9800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e9800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecac9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b43840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf2d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4c38c r4:85a4c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4c38c r4:8524a800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e9800 r8:8524a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524a800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a800 r8:8027f5e8 r7:ecac5e60 r6:84785280 r5:849e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecac9fb0 to 0xecac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b43700 INFO: task kworker/1:957:6061 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: befa2000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:958:6063 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:958 state:D stack:0 pid:6063 tgid:6063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecad1d84 r8:00000002 r7:60000113 r6:ecad1d8c r5:849eb000 r4:849eb000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849eb000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecad1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b43940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb511000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4cb8c r4:85a4c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4cb8c r4:8524a880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849eb000 r8:8524a8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524a880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a880 r8:8027f5e8 r7:ecac5e60 r6:84785300 r5:849eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecad1fb0 to 0xecad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b43580 INFO: task kworker/1:958:6063 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bf150000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:959:6065 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:959 state:D stack:0 pid:6065 tgid:6065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecad9d84 r8:00000002 r7:60000113 r6:ecad9d8c r5:849ea400 r4:849ea400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ea400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecad9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b43900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb697000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4c78c r4:85a4c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4c78c r4:8524a900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ea400 r8:8524a92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524a900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a900 r8:8027f5e8 r7:ecac5e60 r6:84785380 r5:849ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecad9fb0 to 0xecad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b439c0 INFO: task kworker/1:959:6065 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bf150000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:960:6067 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:960 state:D stack:0 pid:6067 tgid:6067 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecae1d84 r8:00000002 r7:60000113 r6:ecae1d8c r5:849ebc00 r4:849ebc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ebc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b43b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4cf8c r4:85a4cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4cf8c r4:8524aa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ebc00 r8:8524aa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524aa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524aa00 r8:8027f5e8 r7:ecac5e60 r6:84785400 r5:849ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae1fb0 to 0xecae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b43a40 INFO: task kworker/1:960:6067 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bf501000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:961:6069 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:961 state:D stack:0 pid:6069 tgid:6069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecae9d84 r8:00000002 r7:60000113 r6:ecae9d8c r5:849ec800 r4:849ec800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ec800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b43d00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb847000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4d78c r4:85a4d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4d78c r4:8524a680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ec800 r8:8524a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524a680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524a680 r8:8027f5e8 r7:ecac5e60 r6:84785480 r5:849ec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae9fb0 to 0xecae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b43d80 INFO: task kworker/1:961:6069 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bf501000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:962:6071 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:962 state:D stack:0 pid:6071 tgid:6071 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecaf1d84 r8:00000002 r7:60000113 r6:ecaf1d8c r5:849ed400 r4:849ed400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ed400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84b43a80 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:00001000 r4:ecf01000 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Call trace: r4:00000000 r9:83018205 r8:849eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 r5:00001000 r4:ec557000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4db8c r4:85a4d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4db8c r4:8524aa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849eec00 r8:8524aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8524aa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8524aa80 r8:8027f5e8 r7:ecac5e60 r6:84785580 r5:849eec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf9fb0 to 0xecaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b43e40 INFO: task kworker/1:963:6074 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:85c39b8c r4:85c39800 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Workqueue: events bpf_prog_free_deferred [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec575000 r4:8524ab80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:00001000 r4:ecf01000 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:00001000 r4:eaaad000 r5:85a4f78c r4:85a4f400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb09fb0 to 0xecb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b43000 INFO: task kworker/1:965:6078 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: bff46000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r10:829188dc r9:ecb11d84 r8:00000002 r7:60000113 r6:ecb11d8c r5:85911800 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a4e78c r4:85a4e400 Exception stack(0xecb11fb0 to 0xecb11ff8) r4:00000000 r4:82ac11e4 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:968:6084 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:968 state:D stack:0 pid:6084 tgid:6084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85914800 r4:829188d8 r5:00001000 r4:ec611000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85914800 r8:8524adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:970:6089 blocked for more than 476 seconds. r5:85915400 r4:829188d8 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8524ab00 r4:852475c0 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85916000 r4:829188d8 r9:83018205 r8:85916000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 r7:ddde2d80 r6:83018200 r5:85a4ff8c r4:8524af00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:972:6093 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:972 state:D stack:0 pid:6093 tgid:6093 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecb39d84 r8:00000002 r7:60000113 r6:ecb39d8c r5:849ee000 r4:849ee000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ee000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb39e08 r4:00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb3de08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:85c39b8c r4:85c39800 r4:00000001 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:974 state:D stack:0 pid:6097 tgid:6097 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecb45d84 r8:00000002 r7:60000013 r6:ecb45d8c r5:85141800 r4:85141800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85141800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb45e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85247f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85141800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb893000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50b8c r4:85a50800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a50b8c r4:85532100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85141800 r8:8553212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85532100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532100 r8:8027f5e8 r7:ecb39e60 r6:84785b00 r5:85141800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb45fb0 to 0xecb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85247a80 INFO: task kworker/1:974:6097 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c1774000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:846ded80 r4:00000001 r4:84a7de40 task:kworker/1:975 state:D stack:0 pid:6098 tgid:6098 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a50f8c r4:85a50c00 r10:61c88647 r9:85142400 r8:855320ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:976:6101 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:976 state:D stack:0 pid:6101 tgid:6101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecb4dd84 r8:00000002 r7:60000013 r6:ecb4dd8c r5:85143000 r4:85143000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85143000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb4de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916f00 r9:83018205 r8:85143000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba81000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a51f8c r4:85a51c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a51f8c r4:85532000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85143000 r8:8553202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85532000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532000 r8:8027f5e8 r7:ecb45e60 r6:84785c00 r5:85143000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb4dfb0 to 0xecb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb8fd000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85143c00 r8:855321ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 INFO: task kworker/1:978:6104 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecb55d84 r8:00000002 r7:60000013 r6:ecb55d8c r5:85144800 r4:85144800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85144800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb55e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8524ef00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85144800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5138c r4:85a51000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5138c r4:85532200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85144800 r8:8553222c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85532200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532200 r8:8027f5e8 r7:ecb4de60 r6:84785d00 r5:85144800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb55fb0 to 0xecb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85247b00 INFO: task kworker/1:978:6104 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c2373000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:979:6107 blocked for more than 476 seconds. r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85532300 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a7de40 INFO: task kworker/1:980:6110 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:980 state:D stack:0 pid:6110 tgid:6110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecb59d84 r8:00000002 r7:60000113 r6:ecb59d8c r5:85146000 r4:85146000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85146000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb59e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553c000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85146000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb1b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5238c r4:85a52000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5238c r4:85532380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85146000 r8:855323ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85532380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532380 r8:8027f5e8 r7:eca45e60 r6:84785e80 r5:85146000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb59fb0 to 0xecb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916b00 INFO: task kworker/1:980:6110 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c26ae000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 INFO: task kworker/0:498:6112 blocked for more than 476 seconds. r5:85146c00 r4:829188d8 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852403c0 r5:85a5838c r4:85a58000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84785f00 r8:8027f5e8 r7:ec9d1e60 r6:84785e00 r5:85146c00 INFO: task kworker/0:498:6112 is blocked on a mutex likely owned by task kworker/1:153:3802. 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e5dc0 r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:981:6113 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:981 state:D stack:0 pid:6113 tgid:6113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecb61d84 r8:00000002 r7:60000113 r6:ecb61d8c r5:85140c00 r4:85140c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85140c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb61e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553c3c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85a5278c r4:85a52400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5278c r4:85532400 r4:85532400 1fa0: 00000000 00000000 00000000 00000000 Call trace: 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:982:6115 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:982 state:D stack:0 pid:6115 tgid:6115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecb65d84 r8:00000002 r7:60000013 r6:ecb65d8c r5:85913c00 r4:85913c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85913c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb65e08 r5:85a52b8c r4:85a52800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a7de40 r4:85aa8c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553c600 r10:61c88647 r9:85aa8c00 r8:8553252c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:984:6120 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:984 state:D stack:0 pid:6120 tgid:6120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecb79d84 r8:00000002 r7:60000013 r6:ecb79d8c r5:85aaa400 r4:85aaa400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aaa400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb79e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553c480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aaa400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc75000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5338c r4:85a53000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5338c r4:85532280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5d28 to 0xe05e5d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84a7de40 Workqueue: events bpf_prog_free_deferred [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:61c88647 r9:85958000 r8:8553262c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:985:6121 is blocked on a mutex likely owned by task kworker/1:153:3802. 5d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:986:6124 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:986 state:D stack:0 pid:6124 tgid:6124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecb7dd84 r8:00000002 r7:60000013 r6:ecb7dd8c r5:85958c00 r4:85958c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85958c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb7de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553ca00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85958c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec4bd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a52f8c r4:85a52c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a52f8c r4:85532580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85958c00 r8:855325ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85532580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532580 r8:8027f5e8 r7:eca45e60 r6:85532780 r5:85958c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb7dfb0 to 0xecb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8553c980 INFO: task kworker/1:986:6124 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:8595e000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:85a53b8c r4:85a53800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85532700 r8:8027f5e8 r7:eca45e60 r6:85532880 r5:8595e000 r4:8553c200 Call trace: 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:988:6128 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:988 state:D stack:0 pid:6128 tgid:6128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecb8dd84 r8:00000002 r7:60000113 r6:ecb8dd8c r5:85aab000 r4:85aab000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aab000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb8de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553cd00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aab000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec521000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a53f8c r4:85a53c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a53f8c r4:85532800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aab000 r8:8553282c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85532800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532800 r8:8027f5e8 r7:eca45e60 r6:85526180 r5:85aab000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb8dfb0 to 0xecb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8553cc40 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Not tainted 6.15.0-syzkaller #0 r4:8595bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb85e08 r5:85a5878c r4:85a58400 r10:00000000 r9:85532980 r8:8027f5e8 r7:eca45e60 r6:85532900 r5:8595bc00 r4:00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r4:84a7de40 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb89e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85738600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8593b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec707000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597838c r4:85978000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597838c r4:85526200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8593b000 r8:8552622c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85526200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526200 r8:8027f5e8 r7:ec9d1e60 r6:85532a00 r5:8593b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb89fb0 to 0xecb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85240340 INFO: task kworker/0:499:6132 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c44f6000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:990:6133 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:990 state:D stack:0 pid:6133 tgid:6133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ec9ddd84 r8:00000002 r7:60000113 r6:ec9ddd8c r5:8593ec00 r4:8593ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9dde08 r9:83018205 r8:8593ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 r5:85a5938c r4:85a59000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 INFO: task kworker/1:990:6133 is blocked on a mutex likely owned by task kworker/1:153:3802. 5d60: 80230ad4 80239bb0 80000013 ffffffff [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85828000 r8:85532bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85532b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532b80 r8:8027f5e8 r7:ec9dde60 r6:85532c80 r5:85828000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb91fb0 to 0xecb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8553cd40 INFO: task kworker/1:991:6135 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c4a5c000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:992:6137 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:992 state:D stack:0 pid:6137 tgid:6137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829188dc r9:ecb95d84 r8:00000002 r7:60000113 r6:ecb95d8c r5:85828c00 r4:00000000 r4:00000000 r5:85a59b8c r4:85a59800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a59b8c r4:85532c00 r4:85532c00 5fa0: 00000000 00000000 00000000 00000000 Call trace: 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:85829800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb99e08 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3b2c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85829800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec72b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a58f8c r4:85a58c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a58f8c r4:85532d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85829800 r8:85532d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85532d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532d00 r8:8027f5e8 r7:ecb95e60 r6:85532e80 r5:85829800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb99fb0 to 0xecb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b3b100 INFO: task kworker/1:993:6139 is blocked on a mutex likely owned by task kworker/1:153:3802. Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d28 to 0xe05e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:994:6141 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:994 state:D stack:0 pid:6141 tgid:6141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecba1d84 r8:00000002 r7:60000113 r6:ecba1d8c r5:8582b000 r4:8582b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8582b000 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:85a59f8c r4:85a59c00 r10:61c88647 r9:8582b000 r8:85532e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8582bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb9de08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a5a78c r4:85a5a400 r10:61c88647 r9:8582bc00 r8:85532f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c546b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:85a5a38c r4:85a5a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecba5fb0 to 0xecba5ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 INFO: task kworker/1:997:6147 blocked for more than 477 seconds. r4:85aabc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb1de08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a5ab8c r4:85a5a800 r10:61c88647 r9:85aabc00 r8:85a7a02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:85c39b8c r4:85c39800 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:84a7de40 task:kworker/1:998 state:D stack:0 pid:6150 tgid:6150 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:85a4bf8c r4:85a4bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a4bf8c r4:85a7a200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aad400 r8:85a7a22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7a200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7a200 r8:8027f5e8 r7:ecba5e60 r6:85526280 r5:85aad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb1fb0 to 0xecbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b3b840 INFO: task kworker/1:998:6150 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c5c4a000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:999:6151 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 Call trace: [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85a5af8c r4:85a5ac00 r7:ddde2d80 r6:83018200 r5:85a5af8c r4:85a7a180 r10:00000000 r9:85a7a180 r8:8027f5e8 r7:ecbb1e60 r6:85526380 r5:85aac800 5d60: 80230ad4 80239bb0 80000013 ffffffff [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85a5b38c r4:85a5b000 r10:61c88647 r9:85aa9800 r8:85a7a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b3bc00 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c633b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1001:6155 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1001 state:D stack:0 pid:6155 tgid:6155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecbc5d84 r8:00000002 r7:60000113 r6:ecbc5d8c r5:85aa8000 r4:85aa8000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85aa8000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc5e08 r4:00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:85a5b78c r4:85a5b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5b78c r4:85a7a380 r4:85a7a380 r4:84b3bd40 r4:00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/1:1002:6157 blocked for more than 477 seconds. r4:85aaec00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b3be80 r5:85a5bb8c r4:85a5b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85a7a400 r8:8027f5e8 r7:ecbb1e60 r6:85526500 r5:85aaec00 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553f540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85aae000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec57b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5bf8c r4:85a5bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5bf8c r4:85a7a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aae000 r8:85a7a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7a480 r8:8027f5e8 r7:ecbb1e60 r6:85526580 r5:85aae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd1fb0 to 0xecbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84b3b080 INFO: task kworker/1:1003:6159 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c69d1000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85820000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85a7a500 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d20: c6f69000 ecf0d000 00000001 80239b98 7f15d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:846ded80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec623000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5c38c r4:85a5c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5c38c r4:85a7a580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85820c00 r8:85a7a5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7a580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7a580 r8:8027f5e8 r7:ecbd9e60 r6:85526680 r5:85820c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe1fb0 to 0xecbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85908080 INFO: task kworker/1:1005:6164 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c75c2000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ecbe9d84 r8:00000002 r7:60000113 r6:ecbe9d8c r5:85821800 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5cb8c r4:85a5c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:846ded80 r4:00000001 r4:84a7de40 task:kworker/1:1007 state:D stack:0 pid:6168 tgid:6168 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5d78c r4:85a5d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5d78c r4:85a7a680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85822400 r8:85a7a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7a680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7a680 r8:8027f5e8 r7:ecbe9e60 r6:85526700 r5:85822400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf1fb0 to 0xecbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85908440 INFO: task kworker/1:1007:6168 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c7a7c000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:846ded80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf9e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85823000 r8:85a7a72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred 5d20: c7a7c000 ecf0d000 00000001 80239b98 7f15d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:846ded80 INFO: task kworker/1:1009:6172 blocked for more than 477 seconds. [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5d38c r4:85a5d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c7e87000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1010:6174 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1010 state:D stack:0 pid:6174 tgid:6174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc09d84 r8:00000002 r7:60000113 r6:ecc09d8c r5:85826000 r4:85826000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85826000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc09e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85908a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85826000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec819000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5db8c r4:85a5d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5db8c r4:85a7a800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85826000 r8:85a7a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7a800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7a800 r8:8027f5e8 r7:ecbf1e60 r6:85526900 r5:85826000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e05e5dc0 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1011:6176 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1011 state:D stack:0 pid:6176 tgid:6176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc11d84 r8:00000002 r7:60000113 r6:ecc11d8c r5:85825400 r4:85825400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85825400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc11e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85908d00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85825400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec84d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5e38c r4:85a5e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5e38c r4:85a7a880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85825400 r8:85a7a8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7a880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7a880 r8:8027f5e8 r7:ecc09e60 r6:85526980 r5:85825400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc11fb0 to 0xecc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85908980 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1012:6178 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1012 state:D stack:0 pid:6178 tgid:6178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc19d84 r8:00000002 r7:60000113 r6:ecc19d8c r5:85824800 r4:85824800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85824800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc19e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018205 r8:85824800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85a5df8c r4:85a7a900 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85826c00 r4:829188d8 r4:00000000 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5e78c r4:85a5e400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:1013:6180 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c89a2000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1014:6182 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1014 state:D stack:0 pid:6182 tgid:6182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:847b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85a5eb8c r4:85a7aa00 r4:85a7aa00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d20: c89a2000 ecf0d000 00000001 80239b98 7f15d000 00000001 r4:e05e5dc0 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1015:6184 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1015 state:D stack:0 pid:6184 tgid:6184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc31d84 r8:00000002 r7:60000113 r6:ecc31d8c r5:847b8000 r4:847b8000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847b8000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc31e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85908fc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec881000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5ef8c r4:85a5ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5ef8c r4:85a7a300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847b8000 r8:85a7a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7a300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7a300 r8:8027f5e8 r7:ecc21e60 r6:85526b80 r5:847b8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc31fb0 to 0xecc31ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe05e5d28 to 0xe05e5d70) 5d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1016:6187 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1016 state:D stack:0 pid:6187 tgid:6187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc35d84 r8:00000002 r7:60000113 r6:ecc35d8c r5:847ba400 r4:847ba400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847ba400 r4:829188d8 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a5f38c r4:85a5f000 r4:85a7ab00 Exception stack(0xecc35fb0 to 0xecc35ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1017:6188 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1017 state:D stack:0 pid:6188 tgid:6188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc39d84 r8:00000002 r7:60000013 r6:ecc39d8c r5:847bb000 r4:847bb000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847bb000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc39e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f90c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a5f78c r4:85a5f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a5f78c r4:85a7ab80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847bb000 r8:85a7abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7ab80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7ab80 r8:8027f5e8 r7:ecc35e60 r6:85526c80 r5:847bb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc39fb0 to 0xecc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/1:1017:6188 is blocked on a mutex likely owned by task kworker/1:153:3802. 5d60: 80230ad4 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1018 state:D stack:0 pid:6190 tgid:6190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc41d84 r8:00000002 r7:60000013 r6:ecc41d8c r5:847bc800 r4:847bc800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847bc800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc41e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec97d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6038c r4:85a60000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6038c r4:85a7aa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847bc800 r8:85a7aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a7aa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a7aa80 r8:8027f5e8 r7:ecc39e60 r6:85526d00 r5:847bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc41fb0 to 0xecc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f9080 INFO: task kworker/1:1018:6190 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: c9b77000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:ecbc9d84 r8:00000002 r7:60000013 r6:ecbc9d8c r5:8582e000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ec8dd000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85a7ac00 9fa0: 00000000 00000000 00000000 00000000 [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:dfb9d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8582d400 r8:85a7adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xecb15fb0 to 0xecb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854f93c0 INFO: task kworker/1:1021:6196 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ca188000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1022:6198 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1022 state:D stack:0 pid:6198 tgid:6198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc49d84 r8:00000002 r7:60000113 r6:ecc49d8c r5:8582a400 r4:8582a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8582a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc49e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8582a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab9b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a60b8c r4:85a60800 r7:ddde2d80 r6:83018200 r5:85a60b8c r4:85a7af00 Exception stack(0xecc49fb0 to 0xecc49ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d28 to 0xe05e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1023:6200 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1023 state:D stack:0 pid:6200 tgid:6200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc51d84 r8:00000002 r7:60000113 r6:ecc51d8c r5:847bbc00 r4:847bbc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847bbc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc51e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f99c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3cb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6138c r4:85a61000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a6138c r4:8598df80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847bbc00 r8:8598dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8598df80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8598df80 r8:8027f5e8 r7:ecc45e60 r6:85526d80 r5:847bbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:854f9740 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1024:6202 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1024 state:D stack:0 pid:6202 tgid:6202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecc59d84 r8:00000002 r7:60000113 r6:ecc59d8c r5:847bd400 r4:847bd400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847bd400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc59e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a60f8c r4:85a60c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a60f8c r4:8590d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847bd400 r8:8590d02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8590d000 r8:8027f5e8 r7:ecc45e60 r6:85526e00 r5:847bd400 r4:854f9a00 Call trace: 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:00000000 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ec74d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8473cb8c r4:85af4100 Exception stack(0xecdb5fb0 to 0xecdb5ff8) r4:8566e040 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:501:6301 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:501 state:D stack:0 pid:6301 tgid:6301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecdc9d84 r8:00000002 r7:60000113 r6:ecdc9d8c r5:85280c00 r4:85280c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85280c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdc9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8566ee00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85280c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ff000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece13000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8497db8c r4:8497d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8497db8c r4:85af4000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85280c00 r8:85af402c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85af4000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4000 r8:8027f5e8 r7:ec9d1e60 r6:85af4200 r5:85280c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdc9fb0 to 0xecdc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8566e340 INFO: task kworker/0:501:6301 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cae9c000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:502 state:D stack:0 pid:6323 tgid:6323 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:85283c00 r7:00000000 r6:83018000 r5:00001000 r4:7f17d000 r5:00001000 r4:ec9b3000 r7:dddced80 r6:83018000 r5:85c3c38c r4:85af4180 Exception stack(0xecc4dfb0 to 0xecc4dff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r4:00000001 r4:84a7de40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3c78c r4:85c3c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3c78c r4:85af4300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85281800 r8:85af432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85af4300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4300 r8:8027f5e8 r7:ecc4de60 r6:85af4400 r5:85281800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea9fb0 to 0xecea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:857710c0 INFO: task kworker/0:503:6347 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cb055000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:6364 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:6364 tgid:6364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eceddd84 r8:00000002 r7:60000113 r6:eceddd8c r5:85284800 r4:85284800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85284800 r4:829188d8 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecf3d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3cb8c r4:85c3c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3cb8c r4:85af4380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85284800 r8:85af43ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85af4380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4380 r8:8027f5e8 r7:ecc4de60 r6:85af4480 r5:85284800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceddfb0 to 0xeceddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85771700 INFO: task kworker/0:504:6364 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cb4f0000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 r4:82ac11e4 r4:00000000 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf89e08 r5:00001000 r4:ecfad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3cf8c r4:85c3cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3cf8c r4:85af4500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85280000 r8:85af452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85af4500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4500 r8:8027f5e8 r7:ecc4de60 r6:85af4600 r5:85280000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf89fb0 to 0xecf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:875303c0 INFO: task kworker/0:505:6384 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cb4f0000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:e05e5dc0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85833000 r7:00000000 r6:83018000 r5:00001000 r4:7f17f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfb5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3d38c r4:85c3d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3d38c r4:85af4580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85833000 r8:85af45ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85af4580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4580 r8:8027f5e8 r7:ecc4de60 r6:8590d100 r5:85833000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced9fb0 to 0xeced9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:87530780 INFO: task kworker/0:506:6390 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:e05e5dc0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:ece99000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:87f17b8c r4:85af4700 Exception stack(0xecf99fb0 to 0xecf99ff8) r4:87530a00 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:e05e5dc0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed03dd84 r8:00000002 r7:60000113 r6:ed03dd8c r5:85286c00 r4:85286c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85286c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed03de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:87ae3d80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85286c00 r7:00000000 r6:83018000 r5:00001000 r4:7f1c7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed087000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8872338c r4:88723000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8872338c r4:85af4680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85286c00 r8:85af46ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85af4680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4680 r8:8027f5e8 r7:ecc4de60 r6:85af4880 r5:85286c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed03dfb0 to 0xed03dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:87530ec0 INFO: task kworker/0:508:6421 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cc11a000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:509:6434 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:509 state:D stack:0 pid:6434 tgid:6434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829188dc r9:ed015d84 r8:00000002 r7:60000113 r6:ed015d8c r5:85286000 r4:00000000 r4:00000000 r5:00001000 r4:ec681000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85c3df8c r4:85af4800 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:e05e5dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:510:6437 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:510 state:D stack:0 pid:6437 tgid:6437 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecfcdd84 r8:00000002 r7:60000113 r6:ecfcdd8c r5:85282400 r4:85282400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85282400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfcde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:87ae3100 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85282400 r7:00000000 r6:83018000 r5:00001000 r4:7f1cd000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecde9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:88725f8c r4:88725c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:88725f8c r4:85af4980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85282400 r8:85af49ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85af4980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4980 r8:8027f5e8 r7:ecc4de60 r6:85af4a80 r5:85282400 r4:00000001 Exception stack(0xecfcdfb0 to 0xecfcdff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e5dc0 r4:00000000 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:511:6438 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:511 state:D stack:0 pid:6438 tgid:6438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecf5dd84 r8:00000002 r7:60000113 r6:ecf5dd8c r5:85285400 r4:85285400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85285400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf5de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85285400 r7:00000000 r6:83018000 r5:00001000 r4:7f295000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbfd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3fb8c r4:85c3f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3fb8c r4:85af4a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85285400 r8:85af4a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85af4a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4a00 r8:8027f5e8 r7:ecfcde60 r6:85af4b00 r5:85285400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf5dfb0 to 0xecf5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:87530180 INFO: task kworker/0:511:6438 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ccf7d000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:512:6445 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:512 state:D stack:0 pid:6445 tgid:6445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecf79d84 r8:00000002 r7:60000113 r6:ecf79d8c r5:85913000 r4:85913000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85913000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ed0d7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Not tainted 6.15.0-syzkaller #0 r4:84849800 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed0df000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 r5:85c39b8c r4:85c39800 r4:846ded80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:514 state:D stack:0 pid:6480 tgid:6480 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed0e7000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85af4d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85af4d00 r8:8027f5e8 r7:ecf5de60 r6:85af4e80 r5:84848c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed091fb0 to 0xed091ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8564abc0 INFO: task kworker/0:514:6480 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cd48e000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:6482 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:6482 tgid:6482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ecfc9d84 r8:00000002 r7:60000113 r6:ecfc9d8c r5:8484a400 r4:8484a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8484a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfc9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb1dd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85af4e00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe05e5d28 to 0xe05e5d70) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:8484b000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0f1e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d28 to 0xe05e5d70) 5d60: 80230ad4 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/0:517:6491 blocked for more than 477 seconds. Workqueue: events bpf_prog_free_deferred r4:8484c800 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8484c800 r7:00000000 r6:83018000 r5:00001000 r4:7f21b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf63000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c3ff8c r4:85c3fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c3ff8c r4:85526f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484c800 r8:85526f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85526f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526f00 r8:8027f5e8 r7:ecf5de60 r6:87aea000 r5:8484c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed10dfb0 to 0xed10dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8564a900 INFO: task kworker/0:517:6491 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cdd3f000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed135e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:519:6556 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:519 state:D stack:0 pid:6556 tgid:6556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed101d84 r8:00000002 r7:60000113 r6:ed101d8c r5:8484e000 r4:8484e000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8484e000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed101e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858f2c80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8484e000 r7:00000000 r6:83018000 r5:00001000 r4:7f285000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2df000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473e78c r4:8473e400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473e78c r4:87aea100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484e000 r8:87aea12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aea100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aea100 r8:8027f5e8 r7:ecf5de60 r6:87aea280 r5:8484e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed101fb0 to 0xed101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f2e40 INFO: task kworker/0:519:6556 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ce693000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ed2e7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8473ef8c r4:87aea200 Exception stack(0xed2b9fb0 to 0xed2b9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f2c40 INFO: task kworker/0:520:6558 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ce693000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) INFO: task kworker/0:521:6561 blocked for more than 477 seconds. r4:8484bc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed109e08 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8484bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f29b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed051000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473df8c r4:8473dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473df8c r4:87aea380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484bc00 r8:87aea3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aea380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aea380 r8:8027f5e8 r7:ecf5de60 r6:87aea480 r5:8484bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed109fb0 to 0xed109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f27c0 INFO: task kworker/0:521:6561 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ce693000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ecd81000 r5:87ee078c r4:87ee0400 r4:87aea400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:847bec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed1e5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d02c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f295000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec537000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bc38c r4:849bc000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849bc38c r4:87aea500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847bec00 r8:87aea52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aea500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aea500 r8:8027f5e8 r7:ed2f1e60 r6:87aea600 r5:847bec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed1e5fb0 to 0xed1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:858f2700 INFO: task kworker/0:523:6573 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cec3f000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:524:6650 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:524 state:D stack:0 pid:6650 tgid:6650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed325d84 r8:00000002 r7:60000113 r6:ed325d8c r5:84851800 r4:84851800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84851800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1c24c0 r5:00001000 r4:ed583000 r5:87ee138c r4:87ee1000 r7:dddced80 r6:83018000 r5:87ee138c r4:87aea680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xed325fb0 to 0xed325ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:525:6651 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:525 state:D stack:0 pid:6651 tgid:6651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed55dd84 r8:00000002 r7:60000113 r6:ed55dd8c r5:84850000 r4:84850000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84850000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed55de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d06c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84850000 r7:00000000 r6:83018000 r5:00001000 r4:7f325000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed02d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee0f8c r4:87ee0c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee0f8c r4:87aea780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84850000 r8:87aea7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aea780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aea780 r8:8027f5e8 r7:ed325e60 r6:87aea800 r5:84850000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed55dfb0 to 0xed55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d0340 INFO: task kworker/0:525:6651 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cf153000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:526:6653 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:526 state:D stack:0 pid:6653 tgid:6653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed5b9d84 r8:00000002 r7:60000113 r6:ed5b9d8c r5:84853000 r4:84853000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84853000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5b9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d0a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84853000 r7:00000000 r6:83018000 r5:00001000 r4:7f335000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed373000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee0b8c r4:87ee0800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee0b8c r4:87aea880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84853000 r8:87aea8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aea880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aea880 r8:8027f5e8 r7:ed325e60 r6:87aea900 r5:84853000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5b9fb0 to 0xed5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:852d0600 INFO: task kworker/0:526:6653 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cf719000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:527:6661 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:527 state:D stack:0 pid:6661 tgid:6661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed5b5d84 r8:00000002 r7:60000113 r6:ed5b5d8c r5:84852400 r4:84852400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed611000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:87aea980 r8:8027f5e8 r7:ed325e60 r6:87aeaa80 r5:84852400 INFO: task kworker/0:527:6661 is blocked on a mutex likely owned by task kworker/1:153:3802. Exception stack(0xe05e5d28 to 0xe05e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed3c5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:87ee1f8c r4:87aeaa00 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1c2b80 INFO: task kworker/0:528:6706 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cfe59000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:6708 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:529 state:D stack:0 pid:6708 tgid:6708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed5b1d84 r8:00000002 r7:60000113 r6:ed5b1d8c r5:84855400 r4:84855400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84855400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed5b1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1c2a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84855400 r7:00000000 r6:83018000 r5:00001000 r4:7f385000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3f5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee238c r4:87ee2000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee238c r4:87aeab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84855400 r8:87aeab2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aeab00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aeab00 r8:8027f5e8 r7:ed5b5e60 r6:87aeac80 r5:84855400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed5b1fb0 to 0xed5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1c2dc0 INFO: task kworker/0:529:6708 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cfe59000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:6710 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:6710 tgid:6710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed66dd84 r8:00000002 r7:60000113 r6:ed66dd8c r5:84856000 r4:84856000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84856000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed66de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1c2cc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84856000 r7:00000000 r6:83018000 r5:00001000 r4:7f387000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5e1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee278c r4:87ee2400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee278c r4:87aeac00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84856000 r8:87aeac2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aeac00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aeac00 r8:8027f5e8 r7:ed5b5e60 r6:87aead80 r5:84856000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed66dfb0 to 0xed66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1c2f40 INFO: task kworker/0:530:6710 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: cfe59000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:6711 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:531 state:D stack:0 pid:6711 tgid:6711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed671d84 r8:00000002 r7:60000113 r6:ed671d8c r5:84853c00 r4:84853c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84853c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed671e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1c2500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84853c00 r7:00000000 r6:83018000 r5:00001000 r4:7f389000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee1b8c r4:87ee1800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee1b8c r4:87aead00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84853c00 r8:87aead2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aead00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aead00 r8:8027f5e8 r7:ed5b5e60 r6:87aeae80 r5:84853c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed671fb0 to 0xed671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1c2a80 INFO: task kworker/0:531:6711 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d0329000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:532:6713 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:532 state:D stack:0 pid:6713 tgid:6713 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed675d84 r8:00000002 r7:60000113 r6:ed675d8c r5:84850c00 r4:84850c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84850c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed675e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1cf640 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed725000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee2f8c r4:87ee2c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee2f8c r4:87aeae00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84850c00 r8:87aeae2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:87aeae00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87aeae00 r8:8027f5e8 r7:ed5b5e60 r6:87aeaf80 r5:84850c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed675fb0 to 0xed675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1c2dc0 INFO: task kworker/0:532:6713 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d07d1000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:533:6723 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:533 state:D stack:0 pid:6723 tgid:6723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed679d84 r8:00000002 r7:60000113 r6:ed679d8c r5:84854800 r4:84854800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84854800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed679e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c0f7440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84854800 r7:00000000 r6:83018000 r5:00001000 r4:7f3b1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6bd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8ace978c r4:8ace9400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8ace978c r4:8c1cc100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84854800 r8:8c1cc12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1cc100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8c1cc100 r8:8027f5e8 r7:ed675e60 r6:8c1cc080 r5:84854800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed679fb0 to 0xed679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1cf040 INFO: task kworker/0:533:6723 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d0b1e000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:534:6740 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:534 state:D stack:0 pid:6740 tgid:6740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed699d84 r8:00000002 r7:60000113 r6:ed699d8c r5:85580000 r4:85580000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85580000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed699e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1cf400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85580000 r7:00000000 r6:83018000 r5:00001000 r4:7f3b7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6d9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee338c r4:87ee3000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee338c r4:8c1cc000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85580000 r8:8c1cc02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1cc000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8c1cc000 r8:8027f5e8 r7:ed675e60 r6:8c1cc180 r5:85580000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed699fb0 to 0xed699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1cf180 INFO: task kworker/0:534:6740 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d0b1e000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85580c00 r5:85580c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed6c5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1cf580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85580c00 r7:00000000 r6:83018000 r5:00001000 r4:7f3b9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6e5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ee378c r4:87ee3400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ee378c r4:8c1cc200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85580c00 r8:8c1cc22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1cc200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8c1cc200 r8:8027f5e8 r7:ed675e60 r6:8c1cc300 r5:85580c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6c5fb0 to 0xed6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1cf440 INFO: task kworker/0:535:6741 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d0d55000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:536:6746 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:536 state:D stack:0 pid:6746 tgid:6746 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85581800 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:edcb5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:87eed38c r4:8c1cc280 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed6e1fb0 to 0xed6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1cf240 INFO: task kworker/0:536:6746 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d11f5000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:537:6752 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:537 state:D stack:0 pid:6752 tgid:6752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed701d84 r8:00000002 r7:60000113 r6:ed701d8c r5:85582400 r4:85582400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85582400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed701e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1cffc0 r5:00001000 r4:ed605000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bd38c r4:849bd000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:849bd38c r4:8c1cc380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8c1cc380 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8c1cf440 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe05e5d28 to 0xe05e5d70) 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:538:6766 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:538 state:D stack:0 pid:6766 tgid:6766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed76dd84 r8:00000002 r7:60000113 r6:ed76dd8c r5:85584800 r4:85584800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85584800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed76de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1cfa00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed681000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849bcf8c r4:849bcc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85584800 r8:8c1cc4ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xed76dfb0 to 0xed76dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:539 state:D stack:0 pid:6768 tgid:6768 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed8ed000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8c1cc680 r8:8027f5e8 r7:ed6e1e60 r6:8c1cc780 r5:85583c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed67dfb0 to 0xed67dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1cf940 INFO: task kworker/0:539:6768 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d1bee000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed779000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:849bcb8c r4:849bc800 r10:61c88647 r9:85585400 r8:8c1cc82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1d9380 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed965d84 r8:00000002 r7:60000113 r6:ed965d8c r5:85586c00 r4:85586c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85586c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed965e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846cba40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85586c00 r7:00000000 r6:83018000 r5:00001000 r4:7f44f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed791000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473ff8c r4:8473fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8473ff8c r4:8c1cc880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85586c00 r8:8c1cc8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1cc880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8c1cc880 r8:8027f5e8 r7:ed6e1e60 r6:8c1cc980 r5:85586c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed965fb0 to 0xed965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846cb6c0 INFO: task kworker/0:541:6837 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d1bee000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda25e08 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846befc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f4b5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed693000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87eec78c r4:87eec400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87eec78c r4:8c1ccc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a8c00 r8:8c1ccc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1ccc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8c1ccc00 r8:8027f5e8 r7:ed6e1e60 r6:8c1ccc80 r5:855a8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda25fb0 to 0xeda25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846e3640 INFO: task kworker/0:543:6877 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d261a000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edad9e08 r5:00001000 r4:edcb7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:855ab000 r8:8c1ccbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1ccb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8c1ccb80 r8:8027f5e8 r7:ed6e1e60 r6:8c1ccd00 r5:855ab000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedad9fb0 to 0xedad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85801300 INFO: task kworker/0:544:6904 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d261a000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 INFO: task kworker/0:545:6982 blocked for more than 478 seconds. r5:855ad400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edcf5e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a1740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f5bb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc47000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8e03ef8c r4:8e03ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8e03ef8c r4:8c1ccd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ad400 r8:8c1ccdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1ccd80 r10:00000000 r9:8c1ccd80 r8:8027f5e8 r7:edad9e60 r6:8c1cce00 r5:855ad400 INFO: task kworker/0:545:6982 is blocked on a mutex likely owned by task kworker/1:153:3802. 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855aec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede15e08 r5:00001000 r4:ede2b000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8c1cce80 r8:8027f5e8 r7:edad9e60 r6:8c1ccf00 r5:855aec00 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:547:7060 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:547 state:D stack:0 pid:7060 tgid:7060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ede21d84 r8:00000002 r7:60000113 r6:ede21d8c r5:855abc00 r4:855abc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855abc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede21e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:90024080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f5e1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edd2b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ef478c r4:87ef4400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ef478c r4:8c1ccf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855abc00 r8:8c1ccfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1ccf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:548:7067 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:7067 tgid:7067 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ede25e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:89b69840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f7a7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf15000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847cc38c r4:847cc000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:847cc38c r4:8c1cc600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ac800 r8:8c1cc62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1cc600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8c1cc600 r8:8027f5e8 r7:ede15e60 r6:8c1cc580 r5:855ac800 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:edee3000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:549:7073 is blocked on a mutex likely owned by task kworker/1:153:3802. 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:550:7092 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:550 state:D stack:0 pid:7092 tgid:7092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:edeedd84 r8:00000002 r7:60000013 r6:edeedd8c r5:855aa400 r4:855aa400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855aa400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edeede08 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed17d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xedeedfb0 to 0xedeedff8) INFO: task kworker/0:550:7092 is blocked on a mutex likely owned by task kworker/1:153:3802. 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:855a9800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda1e08 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f7a9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf2d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ef838c r4:87ef8000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ef838c r4:85658200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a9800 r8:8565822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85658200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85658200 r8:8027f5e8 r7:edeede60 r6:85658300 r5:855a9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecda1fb0 to 0xecda1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:89b697c0 INFO: task kworker/0:551:7315 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d3863000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:846ded80 r4:00000001 r4:84a7de40 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ecf71000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ef878c r4:85658280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a8000 r8:856582ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85658280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85658280 r8:8027f5e8 r7:edeede60 r6:85658380 r5:855a8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed231fb0 to 0xed231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:89b69d00 INFO: task kworker/0:552:7318 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d3863000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:553 state:D stack:0 pid:7320 tgid:7320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed24dd84 r8:00000002 r7:60000013 r6:ed24dd8c r5:85586000 r4:85586000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85586000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed24de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:89b69e40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85586000 r7:00000000 r6:83018000 r5:00001000 r4:7f7ad000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf8d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87ef8f8c r4:87ef8c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87ef8f8c r4:85658400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85586000 r8:8565842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85658400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85658400 r8:8027f5e8 r7:edeede60 r6:85658480 r5:85586000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:85ab0000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ecffd000 r7:dddced80 r6:83018000 r5:87ef8b8c r4:85658500 r4:00000001 r4:89b69dc0 INFO: task kworker/0:554:7322 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d3ce8000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Not tainted 6.15.0-syzkaller #0 r4:85ab0c00 r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed021000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:87ef938c r4:85658580 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:556:7326 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:556 state:D stack:0 pid:7326 tgid:7326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed259d84 r8:00000002 r7:60000013 r6:ed259d8c r5:85ab1800 r4:85ab1800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab1800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed0cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:87ef978c r4:87ef9400 r10:61c88647 r9:85ab1800 r8:856586ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d448b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:85ab2400 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed129000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:87ef9b8c r4:85658780 Exception stack(0xed0b1fb0 to 0xed0b1ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:85ab3000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed25de08 r5:00001000 r4:ed15d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85ab3000 r8:8565892c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe05e5d28 to 0xe05e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed275e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85658980 r8:8027f5e8 r7:edeede60 r6:8590d700 r5:85832400 r4:857386c0 INFO: task kworker/0:559:7333 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d4b52000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:560:7334 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:560 state:D stack:0 pid:7334 tgid:7334 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85835400 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed195000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:87efab8c r4:87efa800 r4:85658b00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:84a7de40 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed331e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af9600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85830c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7bf000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1ad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87efaf8c r4:87efac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87efaf8c r4:85658a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85830c00 r8:85658aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85658a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85658a80 r8:8027f5e8 r7:ed275e60 r6:8590d600 r5:85830c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed331fb0 to 0xed331ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85af9080 INFO: task kworker/0:561:7336 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d5097000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed335e08 r5:00001000 r4:ed1c5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85836000 r8:85658c2c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e05e5dc0 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:7340 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:563 state:D stack:0 pid:7340 tgid:7340 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed339d84 r8:00000002 r7:60000013 r6:ed339d8c r5:85830000 r4:85830000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85830000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed339e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af9a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85830000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed1db000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87efb78c r4:87efb400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87efb78c r4:85658c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r4:85af9700 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed33de08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87efbb8c r4:85658d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85836c00 r8:85658d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85658d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85658d00 r8:8027f5e8 r7:ed275e60 r6:8590d900 r5:85836c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed33dfb0 to 0xed33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85af93c0 INFO: task kworker/0:564:7342 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d5bf9000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed223000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed267000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752038c r4:87520000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752038c r4:85658e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85833c00 r8:85658e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85658e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85658e00 r8:8027f5e8 r7:ed275e60 r6:8590da00 r5:85833c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed345fb0 to 0xed345ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85af9980 INFO: task kworker/0:566:7346 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d5f80000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:567:7349 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:567 state:D stack:0 pid:7349 tgid:7349 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed7d5e08 r5:00001000 r4:ed293000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8752078c r4:85658d80 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed7d5fb0 to 0xed7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85af9900 INFO: task kworker/0:567:7349 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d5f80000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r5:00001000 r4:ecf01000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:568 state:D stack:0 pid:7351 tgid:7351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed839d84 r8:00000002 r7:60000013 r6:ed839d8c r5:85a3a400 r4:85a3a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a3a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed839e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af93c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a3a400 r7:00000000 r6:83018000 r5:00001000 r4:7f7cb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2ab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87520f8c r4:87520c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87520f8c r4:85658f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a3a400 r8:85658f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85658f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85658f00 r8:8027f5e8 r7:ed275e60 r6:8590db00 r5:85a3a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed839fb0 to 0xed839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85af9640 INFO: task kworker/0:568:7351 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a7de40 task:kworker/0:569 state:D stack:0 pid:7353 tgid:7353 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85af9b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a38000 r7:00000000 r6:83018000 r5:00001000 r4:7f7cf000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed35f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752178c r4:87521400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752178c r4:85658f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a38000 r8:85658fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85658f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85658f80 r8:8027f5e8 r7:ed275e60 r6:8590db80 r5:85a38000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed83dfb0 to 0xed83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85af9700 INFO: task kworker/0:569:7353 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d627b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:570 state:D stack:0 pid:7354 tgid:7354 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed3a7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8752238c r4:85658100 Exception stack(0xed875fb0 to 0xed875ff8) INFO: task kworker/0:570:7354 is blocked on a mutex likely owned by task kworker/1:153:3802. Exception stack(0xe05e5d28 to 0xe05e5d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r5:85c39b8c r4:85c39800 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:571 state:D stack:0 pid:7356 tgid:7356 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed88dd84 r8:00000002 r7:60000013 r6:ed88dd8c r5:85a3bc00 r4:85a3bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a3bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed88de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846d5480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a3bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f7d1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed377000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87521b8c r4:87521800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87521b8c r4:9053c100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a3bc00 r8:9053c12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053c100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053c100 r8:8027f5e8 r7:ed875e60 r6:8590dc80 r5:85a3bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed88dfb0 to 0xed88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8564a0c0 INFO: task kworker/0:571:7356 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d6b24000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:85a3c800 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85a3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f7d3000 r5:00001000 r4:ed38f000 r5:8752138c r4:87521000 r4:9053c080 Exception stack(0xed899fb0 to 0xed899ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846d54c0 INFO: task kworker/0:572:7358 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d6b24000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r10:829188dc r9:ed8a1d84 r8:00000002 r7:60000113 r6:ed8a1d8c r5:85a3d400 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed3bf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85a3d400 r8:9053c1ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:574:7362 blocked for more than 478 seconds. r4:85a3e000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed8b1e08 r5:00001000 r4:ed40b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed8b1fb0 to 0xed8b1ff8) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:575:7364 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:575 state:D stack:0 pid:7364 tgid:7364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed91dd84 r8:00000002 r7:60000013 r6:ed91dd8c r5:85a3ec00 r4:85a3ec00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85a3ec00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed91de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e3600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85a3ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f7d9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3d7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87522b8c r4:87522800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87522b8c r4:9053c200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a3ec00 r8:9053c22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053c200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053c200 r8:8027f5e8 r7:ed8b1e60 r6:8590de80 r5:85a3ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed91dfb0 to 0xed91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846e31c0 INFO: task kworker/0:575:7364 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d72a2000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r4:00000001 Not tainted 6.15.0-syzkaller #0 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8752378c r4:87523400 r7:dddced80 r6:83018000 r5:8752378c r4:9053c300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a39800 r8:9053c32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053c300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053c300 r8:8027f5e8 r7:ed8b1e60 r6:8590df00 r5:85a39800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed929fb0 to 0xed929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846e3580 INFO: task kworker/0:576:7366 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d7580000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 r5:00001000 r4:ecf01000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed47b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 80000013 ffffffff [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:578:7372 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:578 state:D stack:0 pid:7372 tgid:7372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed931d84 r8:00000002 r7:60000113 r6:ed931d8c r5:84a30000 r4:84a30000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a30000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed931e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e3f40 r9:83018005 r8:84a30000 r7:00000000 r6:83018000 r5:00001000 r4:7f7e1000 r5:00001000 r4:ed42b000 r10:61c88647 r9:84a30000 r8:9053c2ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe05e5fb0 to 0xe05e5ff8) task:kworker/0:579 state:D stack:0 pid:7373 tgid:7373 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e39c0 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:87523f8c r4:9053c480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a30c00 r8:9053c4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053c480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053c480 r8:8027f5e8 r7:ed261e60 r6:8590d580 r5:84a30c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed941fb0 to 0xed941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846e3ec0 INFO: task kworker/0:579:7373 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d7e41000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a31800 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed539000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 r4:84a32400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a32400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed955e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846e3880 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a32400 r7:00000000 r6:83018000 r5:00001000 r4:7f7e7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4b7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752438c r4:87524000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752438c r4:9053c580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a32400 r8:9053c5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053c580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053c580 r8:8027f5e8 r7:ed94de60 r6:8590d480 r5:84a32400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed955fb0 to 0xed955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846e3e80 INFO: task kworker/0:581:7377 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d82d2000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:e05e5dc0 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Not tainted 6.15.0-syzkaller #0 r4:84a33000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed511000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed625000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87525b8c r4:87525800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87525b8c r4:9053c500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a33c00 r8:9053c52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053c500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053c500 r8:8027f5e8 r7:ed94de60 r6:8590d380 r5:84a33c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed95dfb0 to 0xed95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:87530980 INFO: task kworker/0:583:7382 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d863b000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:7383 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:584 state:D stack:0 pid:7383 tgid:7383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed969d84 r8:00000002 r7:60000013 r6:ed969d8c r5:84a34800 r4:84a34800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a34800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed969e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1d9040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a34800 r7:00000000 r6:83018000 r5:00001000 r4:7f7ed000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5c1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752538c r4:87525000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752538c r4:9053c600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:9053c600 Exception stack(0xed969fb0 to 0xed969ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d8b86000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:585:7385 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:585 state:D stack:0 pid:7385 tgid:7385 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed96dd84 r8:00000002 r7:60000013 r6:ed96dd8c r5:84a35400 r4:84a35400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a35400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed96de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1d9400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a35400 r7:00000000 r6:83018000 r5:00001000 r4:7f7ef000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5d5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87524f8c r4:87524c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87524f8c r4:9053c700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a35400 r8:9053c72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053c700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053c700 r8:8027f5e8 r7:ed95de60 r6:8590d280 r5:84a35400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed96dfb0 to 0xed96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1d91c0 INFO: task kworker/0:585:7385 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d8b86000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:586:7387 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:586 state:D stack:0 pid:7387 tgid:7387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed971d84 r8:00000002 r7:60000013 r6:ed971d8c r5:84a36000 r4:84a36000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a36000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed971e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1d96c0 r5:00001000 r4:ed5fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a36000 r8:9053c82c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe05e5d28 to 0xe05e5d70) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:00000000 r5:00001000 r4:ecf01000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ed979d84 r8:00000002 r7:60000113 r6:ed979d8c r5:85650000 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ed631000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8752638c r4:9053c880 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8c1d94c0 INFO: task kworker/0:587:7390 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: d8fca000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:588:7392 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:588 state:D stack:0 pid:7392 tgid:7392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed9c9d84 r8:00000002 r7:60000013 r6:ed9c9d8c r5:85651800 r4:85651800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85651800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed9c9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1d9b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85651800 r7:00000000 r6:83018000 r5:00001000 r4:7f7f7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed63f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752678c r4:87526400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752678c r4:9053c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85651800 r8:9053c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053c780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053c780 r8:8027f5e8 r7:ed979e60 r6:9053a100 r5:85651800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed9c9fb0 to 0xed9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1d9280 INFO: task kworker/0:588:7392 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) r4:e05e5dc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/0:589 state:D stack:0 pid:7393 tgid:7393 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ed65b000 r7:dddced80 r6:83018000 r5:87526b8c r4:9053c980 INFO: task kworker/0:589:7393 is blocked on a mutex likely owned by task kworker/1:153:3802. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:7396 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:7396 tgid:7396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eda09d84 r8:00000002 r7:60000013 r6:eda09d8c r5:85653000 r4:85653000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85653000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda09e08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed805000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85653000 r8:9053ca2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85650c00 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda0de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1d9fc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85650c00 r7:00000000 r6:83018000 r5:00001000 r4:7f7fb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed669000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87526f8c r4:87526c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87526f8c r4:9053ca80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85650c00 r8:9053caac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeda0dfb0 to 0xeda0dff8) INFO: task kworker/0:591:7397 is blocked on a mutex likely owned by task kworker/1:153:3802. 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a7de40 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed74d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8752738c r4:9053c900 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:593:7404 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:593 state:D stack:0 pid:7404 tgid:7404 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eda05d84 r8:00000002 r7:60000013 r6:eda05d8c r5:85655400 r4:85655400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85655400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda05e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8c1d9780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85655400 r7:00000000 r6:83018000 r5:00001000 r4:7f805000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed799000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752778c r4:87527400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752778c r4:9053cb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85655400 r8:9053cb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053cb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053cb00 r8:8027f5e8 r7:eda09e60 r6:9053a400 r5:85655400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda05fb0 to 0xeda05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1d9e80 INFO: task kworker/0:593:7404 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:594 state:D stack:0 pid:7406 tgid:7406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eda19d84 r8:00000002 r7:60000113 r6:eda19d8c r5:85656c00 r4:85656c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85656c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda19e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9d80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85656c00 r7:00000000 r6:83018000 r5:00001000 r4:7f809000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7c9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87527b8c r4:87527800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87527b8c r4:9053cc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85656c00 r8:9053ccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053cc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053cc80 r8:8027f5e8 r7:eda09e60 r6:9053a380 r5:85656c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda19fb0 to 0xeda19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8c1d9e80 INFO: task kworker/0:594:7406 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: da5da000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda29e08 r5:00001000 r4:ed7ed000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a36c00 r8:9053cd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8c1d9dc0 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:596:7411 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:596 state:D stack:0 pid:7411 tgid:7411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eda31d84 r8:00000002 r7:60000113 r6:eda31d8c r5:85656000 r4:85656000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85656000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda31e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ed869000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:87528b8c r4:87528800 r10:61c88647 r9:85656000 r8:9053cdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:846d5180 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dab19000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed265d84 r8:00000002 r7:60000113 r6:ed265d8c r5:85ab6c00 r4:85ab6c00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab6c00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed265e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:90532000 r5:00001000 r4:ed81d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xed265fb0 to 0xed265ff8) Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ed911000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:599:7418 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:599 state:D stack:0 pid:7418 tgid:7418 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eda65d84 r8:00000002 r7:60000113 r6:eda65d8c r5:85ab5400 r4:85ab5400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85ab5400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda65e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:90532440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab5400 r7:00000000 r6:83018000 r5:00001000 r4:7f813000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8a5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87528f8c r4:87528c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87528f8c r4:9053cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ab5400 r8:9053cfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:9053cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:9053cf80 r8:8027f5e8 r7:eda35e60 r6:9053cc00 r5:85ab5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda65fb0 to 0xeda65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:905324c0 INFO: task kworker/0:599:7418 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85ab3c00 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed8c9000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:82ac11e4 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:90532a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85ab4800 r7:00000000 r6:83018000 r5:00001000 r4:7f781000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b6000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:87529f8c r4:87529c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:87529f8c r4:90528000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ab4800 r8:9052802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:90528000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:90528000 r8:8027f5e8 r7:eda35e60 r6:90528200 r5:85ab4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda89fb0 to 0xeda89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:90532380 INFO: task kworker/0:601:7422 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: db9d1000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 Not tainted 6.15.0-syzkaller #0 r4:8d578000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ed961000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:603 state:D stack:0 pid:7426 tgid:7426 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eda91e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:90532cc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8d578c00 r7:00000000 r6:83018000 r5:00001000 r4:7f783000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa87000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752a78c r4:8752a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752a78c r4:90528300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8d578c00 r8:9052832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:90528300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:90528300 r8:8027f5e8 r7:eda89e60 r6:90528380 r5:8d578c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeda91fb0 to 0xeda91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:90532780 INFO: task kworker/0:603:7426 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dbe12000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:604:7427 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecc8d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8752ab8c r4:90528400 Exception stack(0xedaa1fb0 to 0xedaa1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:90532a80 INFO: task kworker/0:604:7427 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dbe12000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:605:7430 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:605 state:D stack:0 pid:7430 tgid:7430 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed0b5d84 r8:00000002 r7:60000013 r6:ed0b5d8c r5:8d57a400 r4:8d57a400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8d57a400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0b5e08 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:ecc13000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752a38c r4:8752a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752a38c r4:90528500 r4:00000001 Exception stack(0xed0b5fb0 to 0xed0b5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:7432 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:606 state:D stack:0 pid:7432 tgid:7432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed0bdd84 r8:00000002 r7:60000113 r6:ed0bdd8c r5:8d57b000 r4:8d57b000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8d57b000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0bde08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:91a2f2c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8d57b000 r7:00000000 r6:83018000 r5:00001000 r4:7f78d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd25000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8d57b000 r8:9052862c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dca1f000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:607:7433 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:607 state:D stack:0 pid:7433 tgid:7433 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed0b9d84 r8:00000002 r7:60000113 r6:ed0b9d8c r5:8d57bc00 r4:8d57bc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8d57bc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0b9e08 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eccb1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8752b38c r4:8752b000 r10:61c88647 r9:8d57bc00 r8:905286ac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:607:7433 is blocked on a mutex likely owned by task kworker/1:153:3802. r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dca1f000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:608:7435 blocked for more than 479 seconds. task:kworker/0:608 state:D stack:0 pid:7435 tgid:7435 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:91a2f000 r5:00001000 r4:ecd0b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8752af8c r4:8752ac00 r10:61c88647 r9:8d57c800 r8:905287ac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:608:7435 is blocked on a mutex likely owned by task kworker/1:153:3802. 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:00000000 r5:85c39b8c r4:85c39800 r4:846ded80 Exception stack(0xe05e5fb0 to 0xe05e5ff8) Not tainted 6.15.0-syzkaller #0 r4:8d57d400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed0c5e08 r5:00001000 r4:ecd9b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752bf8c r4:8752bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752bf8c r4:90528880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8d57d400 r8:905288ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:90528880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:90528880 r8:8027f5e8 r7:ed0bde60 r6:90528a00 r5:8d57d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed0c5fb0 to 0xed0c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:91a2f240 INFO: task kworker/0:609:7438 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dcd88000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:846ded80 r4:84a7de40 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd49000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8752bb8c r4:8752b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8752bb8c r4:90528980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8d57e000 r8:905289ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:90528980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:90528980 r8:8027f5e8 r7:ed0c5e60 r6:90528a80 r5:8d57e000 Exception stack(0xed0fdfb0 to 0xed0fdff8) INFO: task kworker/0:610:7439 is blocked on a mutex likely owned by task kworker/1:153:3802. r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8d57ec00 r4:00000000 r9:83018005 r8:8d57ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f793000 r5:00001000 r4:ecdb9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:92ee438c r4:92ee4000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:92ee438c r4:90528b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8d57ec00 r8:90528b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:90528b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:90528b00 r8:8027f5e8 r7:ed0c5e60 r6:90528c00 r5:8d57ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed111fb0 to 0xed111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:91a2f400 INFO: task kworker/0:611:7441 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dd4b9000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:851d8000 r4:829188d8 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:91a2f580 INFO: task kworker/0:612:7443 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dd4b9000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-syzkaller #0 r5:851d8c00 r4:829188d8 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:91a2f680 r5:00001000 r4:ecdfb000 r5:92ee4b8c r4:92ee4800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad4 80239bb0 80000013 ffffffff r4:e05e5dc0 r5:00001000 r4:ecf01000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed141e08 r5:00001000 r4:ed0cb000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:614:7448 is blocked on a mutex likely owned by task kworker/1:153:3802. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:846ded80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:851da400 r4:829188d8 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:91a2fc40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851da400 r7:00000000 r6:83018000 r5:00001000 r4:7f799000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece45000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:92ee4f8c r4:92ee4c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:92ee4f8c r4:90528f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851da400 r8:90528f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:90528f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:90528f00 r8:8027f5e8 r7:ed141e60 r6:90528f80 r5:851da400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed151fb0 to 0xed151ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:91a2f900 INFO: task kworker/0:615:7449 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: dd827000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:7451 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:616 state:D stack:0 pid:7451 tgid:7451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed165d84 r8:00000002 r7:60000013 r6:ed165d8c r5:851db000 r4:851db000 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851db000 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed165e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:91a2fdc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851db000 r7:00000000 r6:83018000 r5:00001000 r4:7f79b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece5d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:92ee538c r4:92ee5000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:92ee538c r4:87af7100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851db000 r8:87af712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:87af7100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87af7100 r8:8027f5e8 r7:ed141e60 r6:87af7080 r5:851db000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed165fb0 to 0xed165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:91a2fb80 INFO: task kworker/0:616:7451 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ddbc8000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:617:7453 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:617 state:D stack:0 pid:7453 tgid:7453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed169d84 r8:00000002 r7:60000013 r6:ed169d8c r5:851dbc00 r4:851dbc00 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851dbc00 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed169e08 [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018005 r8:851dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f79d000 r5:00001000 r4:ececb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:92ee578c r4:92ee5400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:92ee578c r4:87af7000 r10:61c88647 r9:851dbc00 r8:87af702c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xed169fb0 to 0xed169ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ddbc8000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:618:7455 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:618 state:D stack:0 pid:7455 tgid:7455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ed16dd84 r8:00000002 r7:60000113 r6:ed16dd8c r5:851dc800 r4:851dc800 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851dc800 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed16de08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:846ef480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f79f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecefb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:92ee5b8c r4:92ee5800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:92ee5b8c r4:87af7180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851dc800 r8:87af71ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:87af7180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87af7180 r8:8027f5e8 r7:ed141e60 r6:87af7300 r5:851dc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed16dfb0 to 0xed16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:91a2fe80 INFO: task kworker/0:618:7455 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ddf70000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c39b8c r4:85c39800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c39b8c r4:846ded80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:846ded80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846ded80 r8:8027f5e8 r7:e0571e60 r6:84ab3480 r5:84a3e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e5fb0 to 0xe05e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a7de40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:619:7457 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:619 state:D stack:0 pid:7457 tgid:7457 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a6221c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a61294>] (__schedule) from [<81a6221c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:edac9d84 r8:00000002 r7:60000113 r6:edac9d8c r5:851dd400 r4:851dd400 [<81a621f0>] (schedule) from [<81a62604>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851dd400 r4:829188d8 [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a649e8>] (__mutex_lock.constprop.0) from [<81a651b4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edac9e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:87af4080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f7a1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf37000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:92ee5f8c r4:92ee5c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:92ee5f8c r4:87af7280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851dd400 r8:87af72ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:87af7280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87af7280 r8:8027f5e8 r7:ed141e60 r6:87af7400 r5:851dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xedac9fb0 to 0xedac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:846e3180 INFO: task kworker/0:619:7457 is blocked on a mutex likely owned by task kworker/1:153:3802. task:kworker/1:153 state:R running task stack:0 pid:3802 tgid:3802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a61294>] (__schedule) from [<81a62650>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84a3e000 r8:80200be4 r7:e05e5d5c r6:ffffffff r5:84a3e000 r4:00000000 [<81a62610>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe05e5d28 to 0xe05e5d70) 5d20: ddf70000 ecf0d000 00000001 80239b98 7f15d000 00000001 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 5d60: 80230ad4 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e05e5dc0 r5:e05e5e08 r4:e05e5dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85695940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85c39b8c r4:85c39800 r4:846ded80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ecf7d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:851de000 r8:87af73ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f15d000 ecf0d000 8280c930 82ac11c4 e05e5da4 e05e5da8 e05e5d78 r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f15d000 r10:61c88647 r9:84a3e000 r8:846dedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a625ec>] (schedule_preempt_disabled) from [<81a64ce8>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:edad1e08 r4:00000000 [<81a651a0>] (__mutex_lock_slowpath) from [<81a651f4>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a651b8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:87af4480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f7a5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecffb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:92ee638c r4:92ee6000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:92ee638c r4:87af7480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851dec00 r8:87af74ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:87af7480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:87af7480 r8:8027f5e8 r7:ed141e60 r6:87af7580 r5:851dec00 r4:00000001